US6317028B1 - Electronic identification, control, and security system and method for consumer electronics and the like - Google Patents

Electronic identification, control, and security system and method for consumer electronics and the like Download PDF

Info

Publication number
US6317028B1
US6317028B1 US09/243,726 US24372699A US6317028B1 US 6317028 B1 US6317028 B1 US 6317028B1 US 24372699 A US24372699 A US 24372699A US 6317028 B1 US6317028 B1 US 6317028B1
Authority
US
United States
Prior art keywords
password
appliance
manufactured article
manufactured
uppc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US09/243,726
Inventor
Carl Valiulis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HINES & ASSOCIATES Inc
Original Assignee
Electronic Security and Identification LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electronic Security and Identification LLC filed Critical Electronic Security and Identification LLC
Priority to US09/243,726 priority Critical patent/US6317028B1/en
Assigned to ELECTRONIC SECURITY AND IDENTIFICATION, LLC reassignment ELECTRONIC SECURITY AND IDENTIFICATION, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VALIULIS, CARL
Application granted granted Critical
Publication of US6317028B1 publication Critical patent/US6317028B1/en
Assigned to HINES & ASSOCIATES, INC. reassignment HINES & ASSOCIATES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ELECTRONIC SECURITY & IDENTIFICATION, LLC
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2814Exchanging control software or macros for controlling appliance services in a home automation network
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • G08B13/1418Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B3/00Line transmission systems
    • H04B3/54Systems for transmission via power distribution lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • H04L12/2818Controlling appliance services of a home automation network by calling their functionalities from a device located outside both the home and the home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B2203/00Indexing scheme relating to line transmission systems
    • H04B2203/54Aspects of powerline communications not already covered by H04B3/54 and its subgroups
    • H04B2203/5429Applications for powerline communications
    • H04B2203/5445Local network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B2203/00Indexing scheme relating to line transmission systems
    • H04B2203/54Aspects of powerline communications not already covered by H04B3/54 and its subgroups
    • H04B2203/5429Applications for powerline communications
    • H04B2203/5458Monitor sensor; Alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B2203/00Indexing scheme relating to line transmission systems
    • H04B2203/54Aspects of powerline communications not already covered by H04B3/54 and its subgroups
    • H04B2203/5462Systems for power line communications
    • H04B2203/5483Systems for power line communications using coupling circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2809Exchanging configuration information on appliance services in a home automation network indicating that an appliance service is present in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L2012/284Home automation networks characterised by the type of medium used
    • H04L2012/2843Mains power line
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L2012/2847Home automation networks characterised by the type of home appliance used
    • H04L2012/285Generic home appliances, e.g. refrigerators
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B70/00Technologies for an efficient end-user side electric power management and consumption
    • Y02B70/30Systems integrating technologies related to power network operation and communication or information technologies for improving the carbon footprint of the management of residential or tertiary loads, i.e. smart grids as climate change mitigation technology in the buildings sector, including also the last stages of power distribution and the control, monitoring or operating management systems at local level
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S20/00Management or operation of end-user stationary applications or the last stages of power distribution; Controlling, monitoring or operating thereof
    • Y04S20/20End-user application control systems

Definitions

  • This invention relates to a system and method to remotely communicate with appliances and other consumer electronics, and more particularly to a system and a method which allows remote communication, control, and security for consumer electronics via radio frequency transmission and the electric power distribution network.
  • a persistent problem with electronic appliances exists mainly due to their expense and ease of portability. This problem is the ease with which electronic appliances are stolen from homes, warehouses, and during transit. Because these devices are so enjoyable to own, and yet are priced out of the reach of many citizens, a significant market for stolen electronic appliances exists. Their ease of portability and lack of security features and identification, as well as the relativity high probability that the recipient of the stolen merchandise will not be caught, or if so not prosecuted, only exacerbates this problem.
  • most consumer electronics devices only carry a written serial number on the device to identify it in the event of a theft, however, since many individuals fail to record or register this serial number, attempts to recover merchandise once it has been stolen often prove futile.
  • RFID radio frequency identification
  • RFID systems use radio frequency to identify, locate, and track items through a system comprising primarily of three components.
  • the system operates under control of a host computer which contains all of the inventory database information required for operation of this system.
  • a passive RFID tag is the second component of the system and is typically applied via a disposable label to product packaging in similar fashion to a bar code tracking label.
  • This disposable label contains an antenna coil and a silicon chip, and requires no separate power source.
  • the silicon chip includes basic modulation circuitry and non-volatile memory to store product identification information.
  • This disposable label is energized by the third component of the system, a RFID reader or interrogator, which transmits a RF signal to the disposable label. As the radio frequency signal passes through the antenna coil, an AC voltage is generated thereacross. This voltage is rectified to supply power to the silicon chip which then transmits the information stored therein back to the reader. This information transmission technique is commonly known as backscattering.
  • Low frequency tags generally operate below 135 kHz and are commonly used for access control and industrial control. While energy at this frequency readily moves through people and other obstacles, data rates are relatively low compared to those of other technologies.
  • Another frequency band used for RFID labels centers around 2.45 GHz, and operates under the same regulatory guidelines as local area networks OpenAir and 802.11. While data rates are greatly increased over the low frequency systems, the ability to transmit this energy through obstacles is somewhat reduced. A benefit of this higher frequency system is that the antennas may be much smaller, and can be etched or screen printed instead of wound from wire.
  • the third frequency band commonly used for RFID labels is 13.56 MHz, a frequency that has been allocated in much of the industrialized world. While data rates are higher and antennas are smaller than with other frequencies, the read ranges are often shorter. A benefit of using this frequency exists due to the world wide allocation of this frequency which means that products may be deployed around the world with little or no modification to the RHD label.
  • RFID label The amount of information which is able to be carried by a RFID label is be quite large.
  • One commercial implementation of a RFID label is marketed by Texas Instruments under the name Tag-It. These commercially available RFID labels provide 256 bytes of user programmable read/write memory partitioned into eight 32 byte blocks. A ninth block contains revision and manufacturing information, while a tenth block contains a unique 32 byte ID code sequentially assigned during manufacturing which is able to provide 4.3 billion unique label identities. Other designs including more or fewer programmable bytes are also available.
  • the distance at which the readers may read the memory information from the RFID label depends on environmental conditions and obstructions, and for the TI Tag-It label is roughly equivalent to distances achievable by state of the art hand held CCD bar code scanners. However, whereas bar codes must be visible and relatively close to the reader in order to be read, the RFID label may be hidden from view, and depending on the design, may be read from several feet away, perhaps even 100 yards away without human intervention.
  • the system of the Bisak '779 patent does not allow for individual identification of electronic appliances coupled to the system. Nor does this system allow any type of control of the electronic devices coupled to the electrical system of house. Further, this security device operates on its own communications protocol operating at 260 kHz and transmitting a unique binary digital code which is suited only to the security feature. The system of Bisak '779 also does not address the problem of theft at the manufactory or transportation levels.
  • an object of the instant invention to overcome many of these and other problems existing in the art. More particularly, it is an object of the instant invention to provide an electronic system of identification, control, and security for use with electronic and electrical appliances. Specifically, it is an object of the instant invention to provide an electronic system which may be utilized as part of the inventory tracking and control system at the manufacturing level, and which deters theft within the manufacturer's inventory control system. Further, it is an object of the instant invention to provide an electronic system which allows for inventory and product identification and control at the transportation level, and which also provides for theft deterrence while in transit. Furthermore, it is an object of the instant invention to provide an electronic system which allows for inventory control at the retail level and which provides theft deterrence there as well.
  • the instant invention provides a system which electronically uniquely identifies each electronic appliance manufactured and sold throughout the world. It is a further feature of the instant invention to utilize this unique electronic identification system in the control and security of these electronic appliances. At least the manufacturing, distribution, transportation, and retail levels it is a feature of the instant invention to utilize RFID technology to identify, track, and secure individual products. It is a further feature of the instant invention that the RFID technology is integrated into the electronic appliances' control structure. It is also a feature of the instant invention to utilize a factory preset security code via the RFID interface which disables the electronic appliance during transit and storage until the electronic appliance is sold to a consumer. Further it is a feature of the invention to include the RFID within the appliance.
  • the system of the instant invention provides a method for deterring theft of manufactured articles.
  • the method comprises the steps of providing a unique universal product protection code (UPPC) for each manufactured article, transmitting a password via radio frequency to each manufactured article, and disabling operation of each manufactured article in response to receipt of the password.
  • the method further comprises the steps of associating the UPPC with the password in a computer system, receiving UPPC information from a user for a particular manufactured article, recalling the password associated with the UPPC information for the particular manufactured article, and transmitting the password to the user to enable operation of the particular manufactured article.
  • UPPC unique universal product protection code
  • the method further comprises the steps of interrogating at least one manufactured article for the UPPC information prior to transport, storing the UPPC information in a computerized shipping system, interrogating the manufactured article for the UPPC information upon receipt of the manufactured article, and comparing the UPPC information stored in the computerized shipping system with the UPPC information interrogated upon receipt to confirm receipt of the manufactured article transported.
  • the method preferably further comprises, before the step of transmitting a password via radio frequency to each manufactured article, the steps of interrogating at least one manufactured article for the UPPC information prior to transport, storing the UPPC information in a computerized shipping system, and generating the password in the computerized shipping system.
  • a preferred method further comprises the steps of interrogating the manufactured article for the UPPC information upon receipt, comparing the UPPC information stored in the computerized shipping system with the UPPC information interrogated upon receipt to confirm receipt of the article transported, and transmitting the password from the computerized shipping system to the manufactured article to enable its operation.
  • a preferred method of the instant invention further comprises the steps of transmitting the associated UPPC and password information to a central computerized system, interrogating the manufactured article at a point of purchase to retrieve the UPPC information, retrieving the password associated with the UPPC for the manufactured article, and transmitting the password to the manufactured article at the point of purchase to enable its operation.
  • a preferred method comprises the steps of energizing the manufactured article, setting a user defined password for the manufactured article, and disabling operation of the manufactured article upon loss of energization.
  • a preferred method further comprises the steps of energizing the manufactured article, entering the user defined password for the manufactured article to re-enable its operation.
  • the method further comprises the steps of storing the user defined password and the UPPC in a computer system, transmitting the UPPC to the computer system upon energization of the manufactured article, and transmitting the user defined password to the manufactured article to enable its operation.
  • a preferred method further comprises the steps of periodically interrogating the manufactured article to determine its presence and enunciating the absence of the manufactured article in response to a lack of response to the step of periodically interrogating.
  • a preferred system of the instant invention for deterring theft of manufactured articles comprises a unique identification code associated with each manufactured article, a password code, communication circuitry capable of transmitting the password code to the manufactured articles, and appliance disabling circuitry suitable for integration with the manufactured articles.
  • This appliance disabling circuitry precludes operation of the manufactured articles upon receipt of the password code.
  • the system further comprises a computerized database. This said computerized database stores the unique identification code in association with the password.
  • the communication circuitry comprises an RFID interrogator and an RFID device.
  • the RFID device is suitable for integration within the manufactured articles.
  • the system also preferably comprises communication interface circuitry interposed between the communication circuitry and the appliance disabling circuitry. In this embodiment, the RFID device removably interfaces with the communication interface circuitry.
  • the system may also preferably comprise secondary communications circuitry capable of transmitting the password code to the manufactured articles.
  • a manufactured appliance in accordance with a preferred embodiment of the instant invention comprises security and control logic circuitry, data storage memory, a unique identification code stored in the memory, and communication circuitry capable of receiving a transmitted password.
  • the security and control logic disables operation of the manufactured appliance in response to receipt of the password.
  • the communication circuitry is an RFID device.
  • a preferred appliance comprises secondary communication interface circuitry capable of receiving the password from an external communication system.
  • an electronic identification, control, and security system comprises an electric power distribution network having a plurality of electric conductors and a plurality of electrical outlets providing electrical coupling thereto, a controller electrically coupled to the electric power distribution network through one of the electrical outlets, and an appliance electrically coupled to the electric power distribution network through one of the electrical outlets.
  • the appliance includes security and control logic, a communication interface interposed between the logic and the electric power distribution network, and circuitry or software for disabling operation of the appliance which is controlled by the logic.
  • Tile controller transmits individualized information to the appliance via the electric power distribution network. This individualized information is independent of a physical location of the appliance.
  • the controller is a personal computer having a controller, a display, a user interface, and a communication module interposed between the controller and the electric power distribution network.
  • the controller may be a portable unit having, a microcontroller, a display, a user interface, and a communication interface interposed between the microcontroller and the electric power distribution network.
  • this portable unit further includes a personal computer interface port.
  • the appliance includes a unique identification code stored therein.
  • the individualized information transmitted by the controller contains an address portion containing the unique identification code.
  • This unique identification code may be set by a manufacturer of the appliance, and may be reset by the consumer.
  • the appliance also includes a security code stored therein.
  • the individualized information contains the security code to allow operation of the appliance.
  • the controller may periodically transmit the individualized information containing the security code, in which case the security and control logic commands the circuitry or software of the appliance to disable its operation in the absence of receipt of the this individualized information after a predetermined time.
  • the security and control logic commands the circuitry or software of the appliance to disable its operation in the absence of receipt of the individualized information containing the security code after a predetermined time from electric coupling to the electric power distribution network.
  • the security and control logic commands the circuitry or software to enable operation of the appliance upon receipt of the individualized information containing the security code.
  • the individualized information contains a control portion, and the logic is responsive to this control portion to control operation of the appliance.
  • the controller generates this control portion in response to user commands, or alternatively in response to a user defined operational program.
  • an appliance for use in an electronic identification, control, and security system comprises an electric power connector adapted to couple the appliance to the electric power distribution network via an electrical outlet, security and control logic, a communication interface interposed between the logic and the electric power connector, and circuitry or software for enabling and disabling operation of the appliance.
  • the circuitry or software is controlled by the logic.
  • This appliance preferably further comprises a unique identification code stored therein. Using this, the logic responds only to messages containing the unique identification code. Additionally or alternatively, the appliance further comprises a security code stored therein. The logic then may command the circuitry or software to enable operation of the appliance upon receipt of the security code. The logic also commands the circuitry or software to disable operation of the appliance after a predetermined time from last receipt of the security code.
  • a portable controller for use in this electronic identification, control, and security system preferably comprises an electric power connector adapted to couple the controller to the electric power distribution network via an electrical outlet, a microcontroller, a memory storage device, a display, a user interface, and a communication interface interposed between the microcontroller and the electric power connector.
  • the microcontroller generates individualized information for transmission by the communication interface to the appliance via the electric power distribution network.
  • this portable controller may further comprise a computer interface port.
  • the microcontroller generates security code information for transmission by the communication interface to the appliance via the electric power distribution network in response to user input from the user interface.
  • the microcontroller periodically generates this security code information for transmission by the communication interface to the appliance via the electric power distribution network.
  • the appliance includes an unique identification code.
  • the portable controller stores this unique identification code in the memory storage device and includes it in the individualized information.
  • an adapter comprises security and control logic, a communication interface electrically coupled to the logic and the electric power distribution network, and circuitry or software for enabling and disabling operation of the appliance.
  • This circuitry or software is controlled by the logic and electrically interposed between the outlet and the electric power connector of the appliance.
  • FIG. 1 is a system overview communications diagram of a system constructed in accordance with the instant invention
  • FIG. 2 is a system level state diagram functionally illustrating aspects of the instant invention
  • FIG. 3 is a system level state diagram illustrating system level states in an alternate embodiment of the instant invention.
  • FIG. 4 is a system level diagram illustrating an implementation of the teachings of the instant invention at the manufacturing, transporting, and warehousing stages;
  • FIG. 5 is a system level diagram illustrating an implementation of the teachings of the instant invention at the retail sale phase
  • FIG. 6, is a system level diagram illustrating an implementation of the teachings of the instant invention in the consumer home and office phase
  • FIG. 7 is a single line block diagram illustrating an embodiment of the instant invention.
  • FIG. 8 is a single line block illustrating an alternative embodiment of the instant invention.
  • FIG. 9 is a single block diagram illustrating a further alternative embodiment of the instant invention.
  • FIG. 10 is a system level single line block diagram constructed in accordance with an embodiment of the instant invention.
  • FIG. 11 is a simplified component block diagram in accordance with an aspect of the instant invention.
  • FIG. 12 is a simplified component block diagram illustrating a further aspect of the instant invention.
  • FIG. 13 is a simplified component block diagram illustrating an alternate aspect of the instant invention.
  • FIG. 14 is a simplified block diagrammatic illustration of a portable control unit in accordance of the teachings of the instant invention.
  • FIG. 15 is a simplified block diagrammatic illustration of an alternate embodiment of a portable control unit in accordance with the teachings of the instant invention.
  • the security circuitry includes an RFID interface to allow RF transmission and tracking of the individual appliances through the manufacturing and inventory process. From the security aspect of the invention a manufacturer sets a password through the RFID interface to disable the appliance from further operation.
  • the RFID information also includes an unique appliance identification number known as a Universal Product Protection Code which may then be utilized for tracking of the product through the manufacturing and inventory process. Once the manufacturing process is complete and the appliance is ready to be shipped, the manufacturer may then send the Universal Product Protection Code (UPPC) information and the associated password to a data commerce and warehouse system. Since the appliance will remain in the disabled state until the password is transmitted to the appliance to enable operation thereof, theft of the appliance is deterred.
  • UPPC Universal Product Protection Code
  • the retail store 26 may then reenable the product for sale.
  • the retail store 26 reads the serial number and requests transmission of the password from the data commerce and warehouse 40 .
  • the appliance will operate in a normal fashion.
  • the request for the password and reenabling of the appliance may take place as part of the point of sale through an automated credit card system. In this way the retail store will be assured that theft of the appliances while in the stores own inventory will be deterred. If the particular appliance is acquired by a business organization 17 , that business organization can set a unique or corporate password to allow operation of the device while plugged in within the business organization.
  • the appliance will continue to operate in a normal fashion until it is de-energized, typically by being unplugged. Once power is restored to the appliance, the appliance will enter a security mode of operation whereby normal operation will be precluded until transmission of the previously set password is transmitted to the appliance. Once again, theft of the appliance while at the business organization 17 is deterred.
  • This password may be transmitted to the data commerce and warehouse 40 to provide a central electronic warehouse of the required enabling passwords in so desired. Additionally, because the system includes the TPPC which is unique for each appliance, a security service 19 may be notified upon detection of the unplugging of a device (the details of which will be provided more fully below).
  • the appliance is purchased from the retail store 26 by a consumer 30 , it is the consumer who then may set a personal password for the appliance to allow its operation while plugged in to the consumer's dwelling.
  • the setting of the password by the consumer 30 will allow normal operation of the appliance until the appliance is de-energized, typically by unplugging the unit.
  • the electronic appliance Once the electronic appliance is plugged in or otherwise energized, it will enter the secure mode of operation precluding further operation until transmission of the personal password is complete. As discussed above, the theft of this appliance is therefore deterred.
  • the consumer 30 may transmit the UPPC and password information to the data commerce and warehouse 40 to provide a central registry of this information for disaster recovery and product retrieval in the event of actual theft.
  • the system of the instant invention at the consumer's dwelling may be programmed to contact a security service 19 for various theft related conditions such as the detection of more than one appliance being unplugged in a short period of time.
  • the preferred mechanism for setting such a password in the consumer environment 30 is a personal computer or a hand held encoder/decoder as will be discussed more fully below.
  • FIG. 1 illustrates the use of a central data commerce and warehouse 40
  • a central data commerce and warehouse 40 one skilled in the art will recognize that such a centralized electronic data commerce and warehouse may not be desired.
  • FIG. 2 Such a system is illustrated in state diagrammatic form in FIG. 2 to which specific reference is now made.
  • the discussion of this alternative embodiment of the system of the instant invention will focus on the functional operation of the system, highlighting each step of the manufacturing, transportation, distribution, and retail stage.
  • an appliance manufacturer 10 manufactures an appliance having some form of functional electronics incorporated therein. During the manufacturing process, the appliance manufacturer 10 individually secures the appliance, as will be described more fully hereinbelow, to preclude any internal theft 12 of the appliance.
  • the appliance is transported 14 through the mails, via a common carrier such as a trucking company, a shipping company, or a train. Since the appliance is shipped from the appliance manufacturer 10 in a secured state, hijacking 16 of the appliance during transportation is no longer viable since a highjacked appliance cannot be operated, and therefore has an extremely low black market fence value. The secured appliance, therefore, will arrive at a distribution center 18 still in a secured state. From the distribution center 18 , the appliance is then transported 20 to the various retail stores 26 . Also during this phase of transportation 20 , the highjacking, 22 of the appliance is equally disadvantageous due to the secured state of the appliance. Having arrived safely, the appliance may be stored in a stock room 24 until it is sold at the retail store 26 .
  • a common carrier such as a trucking company, a shipping company, or a train. Since the appliance is shipped from the appliance manufacturer 10 in a secured state, hijacking 16 of the appliance during transportation is no longer viable since a highjacked appliance cannot be operated, and therefore has an extremely low black market
  • the retail store 26 upon successfully negotiating a purchase 28 with a consumer 30 , requests security information 32 from the appliance manufacturer 10 .
  • the appliance manufacturer 10 sends security information 34 to the retail store 26 to allow the appliance to be placed in an unsecured state at the time of purchase 28 .
  • the security information may be provided to the consumer either directly from the manufacturer 10 or through the retail store 26 .
  • the appliance is provided with a fixed password which is provided to the consumer 30 to allow operation of the appliance.
  • the consumer 30 may then secure the appliance as will be described more fully hereinbelow. Additionally, the consumer 30 may also register 36 the appliance with the appliance manufacturer, receiving a registration acknowledgment in response, to allow warranty claims and replacement 38 of appliance components in the future. These warranty claims and replacements 38 are indicated in FIG. 2 as being an unauthorized state which may actually be either (1) unsecured, or (2) set with a manufacturer password or a password which is communicated to the manufacturer to allow operational testing and repair of the appliance.
  • the appliance In the hands of the consumer 30 , the appliance is in a user definable state.
  • the user in accordance with the teachings of the instant invention, may choose to secure the appliance from future theft, or may choose to leave the appliance in an unsecured state by simply failing to set the security feature within the unsecured appliance.
  • the method for setting the security feature within the appliance, as well as the system used to provide this security, will be described more fully hereinbelow.
  • a central or distributed registration authority 40 is included within the system to provide central security and database tracking of security information for manufactured appliances to aid in the security, authentication, and theft recovery of consumer appliances.
  • the appliance manufacturer first sends security information for each of the appliances manufactured and secured therein to the registration authority.
  • the registration authority 40 stores this security information for each manufactured appliance for later coordination and retrieval, and sends a security acknowledgment 44 to the appliance manufacturer 10 . This indicates that the registration authority has successfully registered the secured appliance.
  • the retail store 26 no longer needs to communicate directly with the appliance manufacturer 10 , but instead may request security information 46 directly from the registration authority 40 upon the negotiation of a purchase 28 with a consumer 30 of the secured appliance.
  • the registration authority 40 transmits 48 the security acknowledgment to the retail store 26 so that the appliance may be placed in the unsecured state, allowing the consumer 30 to later operate the appliance.
  • the appliance is now in a user definable state wherein the user may, as described above, either choose to secure the appliance, or leave it in an unsecured state. Should the consumer decide to place the appliance in a secured state, he may do so without further required interaction with any other party.
  • a security acknowledgment 50 which may be a password, is transmitted to the consumer 30 via voice or modem communication.
  • This password may then be utilized in one embodiment of the instant invention to unlock the consumer's ability to set his or her own password via the voice or modem communication.
  • Security for this information transfer may be provided through any available means of encryption as appropriate.
  • consumer registration and warranty information received from the consumer 30 may be transmitted via the registration authority 40 to the appliance manufacturer 10 .
  • the registration authority 40 may also transmit manufacturing specifications, diagnostics, help, and other user manuals directly to the consumer 30 if so desired.
  • the registration authority 40 also provides a mechanism for automatic notification of recall information or other safety issues which must be transmitted to the consumers 30 who have purchased the particular products for which this information is needed.
  • a manufacturer 10 encodes each individual appliance with a unique Universal Product Protection Code (UPPC) and a security password via a radio frequency transmission of this information.
  • UPPC Universal Product Protection Code
  • an RFID reader or interrogator 21 is utilized in the manufacturing process to transmit this information directly to the individual appliances.
  • This information is generated and stored by the manufacturer's business system 23 which typically has been used to track inventory and other information relating to the manufacturing process.
  • each individual appliance is manufactured with a unique UPPC which is first read by the RFID interrogator 21 and transmitted to the business system 23 .
  • the business system 23 then preferable transmits to the interrogator 21 the security password information to be encoded into the individual appliance.
  • the UPPC/password information is correlated and stored within the business system. This information may be transmitted from business system 23 to the registration authority 40 at any point during the manufacturing process, and is preferably transmitted as part of an online shipping system 25 used in association with the transportation provider.
  • the shipping carrier 27 may verify the contents of the cargo through the use of an RFID interrogator 31 .
  • This interrogator 31 may utilize simultaneous communication techniques with the RFID system to allow verification of cargo contents without requiring individual scanning of the individual products on a shipping pallet.
  • the information received through the RFID interface may be entered into the online system 25 via an encoder interface 33 which utilizes either an RF or docking station type interface with the interrogator 31 .
  • the shipping carrier may set its own password to maintain control over the shipment.
  • the interrogator 37 may then verify receipt of all shipped goods via its own online shipping system 39 once the information has been transmitted thereto via the encoder interface 41 .
  • the verification may be made via communication with the registration authority 40 as illustrated in FIG. 4, or through communication with its own internal online shipping system as desired.
  • a preferred retail system will utilize an RFID interrogator 51 which is linked to an electronic transaction terminal point of sale system 53 .
  • This point of sale system 53 is preferably tied to the retail store's inventory control system which utilizes the product's UPPC.
  • the point of sale system 53 may preferably communicate automatically to the central data base or registration authority 40 to retrieve the product's password to enable operation thereof. Once retrieved, the interrogator 51 transmits this password information to the electronic appliance, thereby enabling its operation for the consumer 30 .
  • the store may well decide to utilize its own internal password to enable and disable the operation of the appliances. In such an event, the communication link to the registration authority 40 would not necessarily be required, and could be replaced by a communication link to the store's own computerized data base which stores this information.
  • the consumers will typically install the electronic appliance in their home or office environment 55 as desired.
  • the consumer may register his purchase with the registration authority 40 by transmitting the UPPC and other information via a modem 57 , via voice communication over the telephone 59 , or even via facsimile 61 .
  • this information identifying the electronic appliance and the particular consumer is received by the central registration authority 40 , appropriate portions of this information is then communicated to the consumer warranty registration system 63 of the appropriate appliance manufacturer.
  • a preferred embodiment of the instant invention incorporates within an electronic appliance a RFID device 65 as illustrated in single line block diagrammatic form in FIG. 7 .
  • the RFID device 65 includes a coil type antenna 67 which receives the transmitted RF signal 69 .
  • This transmitted RF signal includes both information and power, and serves both to energize the RFID device 65 as well as transmit information thereto.
  • the RUID device 65 communicates with the interrogator (not shown) via a technique known as backscattering.
  • this RFID device 65 is integrated into the electronic appliance and communicates directly with the security and control logic 71 thereof.
  • This security and control logic 71 includes permanent data storage 73 as is conventional.
  • This permanent data storage 73 may maintain the UPPC and password information required by the system of the instant invention, or this information may be stored in the RFID device 65 itself as is common with conventional RFID devices. In any event, this information is coordinated through the security and control logic 71 of the appliance to disable operation of the appliance via a disabling device 75 .
  • This disabling device may take the form of control logic which prohibits operation of the appliance, hardware circuitry to prevent operation of the appliance, or a combination of both as appropriate for the particular appliance into which the system is incorporated.
  • a preferred embodiment of the instant invention also includes a communication bus 77 which interfaces with a communication interface 79 to allow hardware communication from the appliance to external devices.
  • This communication interface 79 may be an external module which couples to the appliance through a communication bus port and cable connector 81 . Use of an external module allows for wide adaptability of the system to multiple communication platforms within the home or office. Alternatively, the communication interface may be integrated within the appliance as desired.
  • FIG. 8 An alternative embodiment of the instant invention utilizing an external RFID interface is illustrated in FIG. 8 .
  • an external RFID module 83 which contains the conventional components of a RFID device 65 and coil 67 is interfaced to the appliance via a communication bus port and cable connector 85 .
  • the information to and from the appliance will be transmitted through a communication bus 87 to the appliance's security and control logic 89 .
  • the security and control logic 89 of the appliance interfaces with permanent data storage 91 and controls the operation of a disabling device 93 which may comprise both hardware and software components as appropriate.
  • the use of the external RFID module 83 allows for wide applicability of the system of the instant invention as it does not specifically tie the appliance to any one particular frequency of operation (,See Background of the Invention section for discussion of the available frequencies currently in use for RFID devices).
  • Such an external system allows a manufacturer to use its existing RFID equipment without having to worry if this is compatible with the shipping company or the retail outlet which may utilize different RFID frequency systems.
  • the structure of this embodiment allows for other topology communication interfaces 95 to be coupled to the system via the cable connector and communication bus port 85 .
  • These other topology communication interfaces 95 allow widespread applicability of the system of the instant invention as the requirement for RFID interfacing equipment is no longer needed at separate stages of the product life cycle.
  • such an interface may allow direct modem communication with the appliance.
  • This communication interface 95 may transmit the UPPC and password information to and from the appliance to allow the securing and control thereof.
  • the securing of the appliance once in the possession of the consumer is accomplished once the appliance has been plugged in to the electrical distribution network in the home or office of the consumer, as illustrated in simplified block diagrammatic single line form in FIG. 10 .
  • the electric utility source 52 supplies electric power to the power distribution network 54 for electric power distribution throughout the home.
  • This distribution network 54 comprises the wiring and electrical outlets, as well as the circuit breakers and switches commonly used in a home, office, or other consumer location.
  • the individual appliances illustrated as a television set 56 , a video player 58 , a stereo 60 , and a computer printer 62 , are plugged into the distribution network 54 via their individual power cords ( 64 , 66 , 68 , and 70 respectively), they receive electric power for operation, and are also now capable of individually receiving the security information to place them into a secured state.
  • This security information is communicated to the individual appliances via the electric power distribution network 54 through a conventional electric power distribution communications protocol, such as X-10 CEBus, or other appropriate communications protocol.
  • the communication and coordination of the security information is contained within a consumer s personal computer 72 which is also plugged into the electric power distribution network 54 by power cord 74 .
  • the security information may be communicated to the appliances via a portable hand held device 76 which is plugged into the electrical system via a common electrical outlet by power and communication cord 78 .
  • FIG. 10 illustrates the use of both a personal computer 72 as well as a hand held device 76 , one skilled in the art will recognize that the use of both of these is not required as much of their functionality in this context is duplicative. However, for enhanced security of the appliances, including the personal computer 72 , the hand held device 76 may be utilized.
  • the personal computer 72 When the personal computer 72 is utilized to transmit security information over the electrical power distribution network 54 , it preferably includes a communications module 80 which is coupled to the electric power cord 74 as illustrated in block diagrammatic form in FIG. 11 . As may be seen from this simplified block diagram, the communications module 80 interfaces directly with the main controller 82 of the PC 72 . In conventional manner, the PC 72 typically includes a display device 84 , a keyboard or other user interface 86 , the capability of printing a hard copy 88 when desired.
  • the communication module 80 may vary depending upon the particular electric power system communications protocol chosen and may be, in a preferred embodiment, an X-10 CM11A which includes an RS-232 serial port 90 as its communications interface with the controller 82 . Obviously, a different communication module 80 may be needed if a different communication protocol were chosen.
  • FIG. 12 illustrates a simplified block diagram of an exemplary appliance constructed in accordance with the teachings of the instant invention.
  • This exemplary appliance 92 contains internal electronics 94 which produce the appliance functionality, and which include a power supply section 96 which conditions the electric power from the AC power connection 98 for use by the control electronics 94 .
  • the communication interface 100 which may be preferably an X-10 CM11A communications module, interfaces directly with the AC power connection 102 which is coupled to the electric power distribution network (not shown).
  • the communication interface module 100 preferably communicates via an RS-232 serial port 104 with the security and control logic module 106 , which may be a PIC16C73 microprocessor, or other appropriate processing means.
  • the security and control logic 106 exchanges data with a permanent data storage device 108 which contains, for example, the unique appliance identification, the security code set by the system, etc.
  • the security and control logic 106 also coordinates the operation of a disabling device 110 which is preferably interposed between the electric power connection 102 to the electric power distribution network (not shown) and the connection of electric power 98 to the power module 96 of the appliance 92 .
  • the power to the appliance electronics 94 may be commanded on or off by the security and control logic 106 in response to communications transmitted over the electric power distribution network and received by the communication interface 100 . While FIG.
  • FIG. 12 illustrates the communication and control element 112 as internal to the appliance 92
  • a communications element 112 may be externally mounted from the appliance 92 as an adapter. This will allow for increased applicability of the system of the instant invention to existing appliances which do not have, or were not designed for internal communications and control mounting of element 112 .
  • the communication and control element 112 would form an adapter and could simply be interposed between the electrical wall outlet and the end of the power cord for the appliance.
  • FIG. 13 An alternate embodiment of an appliance 114 suitable for use with, and incorporating the teachings of the instant invention is illustrated in FIG. 13 .
  • the appliance 114 incorporates the security and control logic functionality 116 , the permanent data storage elements 118 , and the disabling device or method 120 within the appliance functionality electronics 122 .
  • the communication interface 124 is still a separate module allowing for the interchangeability with different communications protocols depending upon a consumer's preferences for his internal electric power distribution network communications system.
  • the disabling device or method 120 performs the functionality of disabling the appliance when commanded to do so, or in response to the security features of the system.
  • This functionality may be performed electronically within the microprocessor functionality control by disabling processor operation, or may be a disabling type relay used in conjunction with the power supply for the appliance. If this second option is employed, the relay should be installed such that stored parameters and presets within the appliances are not reset.
  • Other implementations of the disabling functionality of element 120 may be utilized as appropriate, and it is the intent of this application to cover all such implementations.
  • this system may also operate with a portable hand held unit 76 , a simplified block diagram of which appears in FIG. 14 .
  • the hand held unit 76 includes an AC power connection 126 which is plugged into the standard wall outlet of the electric power distribution network (not shown).
  • the AC power coupled by this connector 126 is used conventionally by an internal power supply 128 , and also is connected to the power line communication interface module 130 .
  • This power line communication interface module 130 may be of the type described above, or may be a universal communications protocol unit which allows for electronic communication over the electric power distribution network using multiple communications protocols. Preferably, however, this power line communication interface module 130 communicates via the X-10 communications protocol.
  • the power line communication interface 130 communicates with and is controlled by a microcontroller 132 , which may be preferably a PIC16C74 microcontroller.
  • This microcontroller 132 coordinates the control and security functions of the system, and transmits and receives the required information over the electric power distribution network as described above.
  • the hand held unit 76 also includes a display, such as liquid crystal display 134 , to allow display of required information to the user. Additionally, a user keypad 136 or other user interface is included to allow consumer input to the microcontroller 132 .
  • the microcontroller 132 also interfaces with a permanent data storage module 138 which is used to store the security and identification information of the coupled appliances installed within the system.
  • the hand held unit 76 may preferably utilize the serial interface 140 of the microcontroller 132 to provide communication with, for example, a user's personal computer 144 .
  • the serial interface 140 will utilize an RS-232 level translator 142 to provide adequate signal level communication with the user's personal computer.
  • the translator 142 may be replaced with a modem to provide remote communications via a telephone line.
  • the hand held unit 76 may “dump” collected and stored data on appliance power usage, operating states, etc. To collect this data, the hand held unit is plugged into a wall socket for a period of time to allow it to communicate with and store data from the appliances coupled to the system.
  • the power line communication interface module 146 is an external device which, through replacement, allows the unit 76 to be utilized with multiple communication protocols.
  • This communication interface 146 may be a plug-in module or card which plugs into the unit 76 , or may be a separate module which is interposed between the AC power connection and the input to the unit 76 itself.
  • the communication interface module 146 is an X-10 CM11A power line communication interface module.
  • the serial interface 140 of the microcontroller 132 is utilized for the communication with the communication interface module 146 .
  • an RS-232 level translator 142 is utilized for this function.
  • the security feature of the instant invention may preferably first be set by the appliance manufacturer to prevent internal theft, or theft during the transportation and final distribution to the retail outlet. This would be accomplished by the appliance manufacturer setting the internal security code to disable the appliance from operation. The unit would then be in the secured state, requiring that the security code be input to unlock the device and allow operation thereof.
  • a separate lock and unlock security code could be implemented to control the security of the appliance.
  • the system would utilize a watch dog timer type arrangement whereby periodic reception of the required security code would be needed to maintain the appliance in an operational mode.
  • the appliance would continually or periodically look for the security code to be received from the electrical power distribution network to ensure its continued existence at a particular consumer location. If the appliance were not to receive the security code within its timeout period, it would automatically enter a non-operational security state, precluding further operation of the appliance until such time as its security register were reset, or otherwise were to receive the proper security code. In this way, theft of the appliance would be discouraged, because operation of the appliance would be prevented without knowing the security code with which that particular appliance had been programmed.
  • the retail store could either reset the security register such that the appliance would be in an unsecured state allowing operation of the appliance without the need for transmission of a security code signal, or the retail store could provide the consumer with the preset security code to allow operation of the appliance in their home by utilizing the system of the instant invention.
  • the consumer may set the security code to a common code for all appliances owned by that particular consumer encoupled to his electric power distribution network. This would be accomplished either through the hand held unit described above or through the personal computer interface also described above.
  • the personal computer preferably periodically transmits the security code over the electric power distribution network to maintain all appliances coupled thereto in an operational state.
  • the system may alternately utilize a security set mode whereby an appliance would be enabled via transmission of the security code, and would continue to operate normally until the unit is unplugged from the electric power distribution network, or electric power is otherwise removed therefrom. Once electric power has been removed and reapplied to the appliance, the system would function to preclude operation of the appliance until reception of the security code as previously set by the system.
  • the system would include a power delay timeout which prevents the lock out from operating for a given period, e.g., 15 seconds, following the loss of power.
  • This power delay timeout prevents the necessity of initiating a password reset due to a power transient.
  • This type of functionality is particularly desirable when the system is operated with the hand held unit described above. In this way, the hand held unit need only be utilized initially upon installation of the appliance, and after each power loss to the appliance.
  • the system of the instant invention also contemplates the ability to set individual security codes for individual appliances. This is accomplished in the instant invention through the use of an individualized identification code stored within or otherwise associated with individual appliances. In this way, a matrix would be established within the system to associate each individual appliance with its particular security code.
  • this individualized appliance identification code also allows for individualized control of the appliances via the communication network over the electric power distribution system at the consumer location. As described above, the individualized addressed message would be ignored by all other appliances coupled to the electric power distribution network, and would only be acted upon by the particular appliance to which the message was directed.
  • the particular format of the individualized identification information for each appliance may take any suitable form which allows for individual identification and addressing of the appliance, a preferred format will be described hereinbelow.
  • a preferred implementation of the electronic identification information takes the form of a twenty byte word.
  • the word is segmented to allow for five bytes for UPC information identifying the make, model, etc. of the appliance, four bytes to identify the manufacture date, one byte to identify the shut down current threshold information to allow the system of the instant invention to coordinate control and load shed operations which will be described more fully hereinbelow, five bytes for the security code, and an additional five bytes for the lot number of the appliance. While not all of this information is required to allow the aforementioned security functionality of the system, it is included for enhanced control features as will be described below.
  • the system of the instant invention may be utilized to coordinate the functionality of these appliances through the centralized communication and control provided by the system.
  • Control of the individual components may be coordinated through the consumer's personal computer 72 (see FIG. 10 ), or may alternatively be coordinated through the hand held device 76 .
  • the consumer would access the system of the instant invention, selecting the appliance ID, and performing the desired control functions thereon. For example, the consumer may set hours of operation for individual appliances so that they may be used only during certain hours of the day. This programming would be maintained even if the particular appliance were removed from its current physical location within the consumer residence and moved to an alternate location.
  • the system would transmit an individualized addressed message disabling the appliance from further operation until the appointed hour for its reenablement.
  • the system may be utilized to control the operation of the various appliances at that particular time. As will be recognized by one skilled in the art, such coordinated control of individual appliances through a personal computer would also allow for remote control of these appliances through external modem communications with the personal computer 72 .
  • the system of the instant invention may also be utilized to maintain performance information concerning each of the individual appliances utilized in the consumer location.
  • the operational status of each of the appliances may be monitored by the system of the instant invention through information transmitted from each of the individual appliances over the electrical distribution network to the central control of the system.
  • the system would then record the operational status of each appliance, as well as any other information transmitted therefrom, in a database to allow coordination for, for example, built in test information, failure information, and warranty information.
  • Additional operational information may be included in the functionality of the individual appliances, encoded with the device ID information of the instant invention, and transmitted over the electric power distribution network in accordance with the teachings of the instant invention.
  • the actual power usage as a function of time, average power usage, total amp-hour usage may all be monitored.
  • this power monitoring may be used to prompt users to take certain actions, e.g., a high refrigerator current draw may signal the system to prompt the user to clean the refrigerator coils or seek service.
  • the system may also utilize this information to automatically turn off an appliance if the recommended maximum power utilization levels are exceeded. If an appliance is turned off in this manner, it may be reenabled without the requirement of a password (non-secure re-energization) with or without a description of the reason why it turned off.
  • One of the significant advantages of the individual identification information of the instant invention is that system control functionality accommodated by various electric power distribution network communication protocols such as X-10 and CEBus is may be advantageously used without the need for reprogramming upon physical movement of appliances within a consumer location.
  • system control functionality accommodated by various electric power distribution network communication protocols such as X-10 and CEBus is may be advantageously used without the need for reprogramming upon physical movement of appliances within a consumer location.
  • the physical movement of a particular appliance from one electrical outlet to another necessitates the reprogramming of the system to recognize the appliance's new physical location.
  • this is no longer a problem as the individual appliance is addressed by individual ID as opposed to by physical location as with other systems. Therefore, the user is not tied to a particular configuration, but may freely rearrange the physical location of devices within the consumer location without having to repeat a time consuming process of programming the entire centralized control system in response.

Abstract

An electronic identification, control, and security system comprises a unique identification code associated with each manufactured article, a password code, communication circuitry capable of transmitting the password code to the manufactured articles, and appliance disabling circuitry. The appliance disabling circuitry may be integrated with the manufactured articles and precludes operation of the manufactured articles upon receipt of the password code. The communication circuitry preferably includes RFID technology to transmit the password code to the article and receive the unique identification code from the article. Such system deters theft of the articles. A method for deterring theft of manufactured articles includes the steps of providing a unique identification code for each manufactured article, transmitting a password via radio frequency to each manufactured article, and disabling operation of each manufactured article in response to receipt of the password. A manufactured appliance comprises security and control logic circuitry, data storage memory, a unique identification code stored in the memory, and communication circuitry for receiving a transmitted password. The security and control logic disables operation of the manufactured appliance in response to receipt of the password.

Description

RELATED APPLICATIONS
This application is a Continuation-in-Part of application Ser. No. 09/122,599, filed Jul. 24, 1998 now U.S. Pat. No. 6,005,476.
FIELD OF THE INVENTION
This invention relates to a system and method to remotely communicate with appliances and other consumer electronics, and more particularly to a system and a method which allows remote communication, control, and security for consumer electronics via radio frequency transmission and the electric power distribution network.
BACKGROUND OF THE INVENTION
Continued advances in the field of consumer electronics and appliances have added a significant number of features to these devices which make their operation simpler, while at the same time increasing their overall functionality. Most pieces of consumer electronics and appliances manufactured today include some sort of computer control within the unit itself. These computers control everything from automatically remembering leap year and adjusting the number of days in February, to the on-screen menu display, picture in picture control, cook cycle time control, to name just a few. While these microprocessors are controlling ever increasing functionality of the consumer electronic devices and appliances into which they are incorporated, their capacity for further increases remains vast. Even with these advanced features and computer control, modern manufacturing techniques have allowed the cost of these devices to decrease since their initial introduction onto the market. However, even with such decreases, the cost of these electronic devices and appliances still remains fairly expensive.
A persistent problem with electronic appliances exists mainly due to their expense and ease of portability. This problem is the ease with which electronic appliances are stolen from homes, warehouses, and during transit. Because these devices are so enjoyable to own, and yet are priced out of the reach of many citizens, a significant market for stolen electronic appliances exists. Their ease of portability and lack of security features and identification, as well as the relativity high probability that the recipient of the stolen merchandise will not be caught, or if so not prosecuted, only exacerbates this problem. Currently, most consumer electronics devices only carry a written serial number on the device to identify it in the event of a theft, however, since many individuals fail to record or register this serial number, attempts to recover merchandise once it has been stolen often prove futile.
At the manufacturing level, companies are continually looking for new methods to keep track of their inventory in an effort to better manage the business and prevent loss through theft. One relatively new technology which many companies are now beginning to utilize is a system of product identification and tracking known as RFID (radio frequency identification). This new technology is primarily used for inventory control and tracking within the factory area and warehouse, and is typically associated with the packaging of the product (a RFID label or tag on the box), and not with the product itself.
RFID systems use radio frequency to identify, locate, and track items through a system comprising primarily of three components. The system operates under control of a host computer which contains all of the inventory database information required for operation of this system. A passive RFID tag is the second component of the system and is typically applied via a disposable label to product packaging in similar fashion to a bar code tracking label. This disposable label contains an antenna coil and a silicon chip, and requires no separate power source. The silicon chip includes basic modulation circuitry and non-volatile memory to store product identification information. This disposable label is energized by the third component of the system, a RFID reader or interrogator, which transmits a RF signal to the disposable label. As the radio frequency signal passes through the antenna coil, an AC voltage is generated thereacross. This voltage is rectified to supply power to the silicon chip which then transmits the information stored therein back to the reader. This information transmission technique is commonly known as backscattering.
Current RFID labels work in one of three frequency ranges. Low frequency tags generally operate below 135 kHz and are commonly used for access control and industrial control. While energy at this frequency readily moves through people and other obstacles, data rates are relatively low compared to those of other technologies. Another frequency band used for RFID labels centers around 2.45 GHz, and operates under the same regulatory guidelines as local area networks OpenAir and 802.11. While data rates are greatly increased over the low frequency systems, the ability to transmit this energy through obstacles is somewhat reduced. A benefit of this higher frequency system is that the antennas may be much smaller, and can be etched or screen printed instead of wound from wire. The third frequency band commonly used for RFID labels is 13.56 MHz, a frequency that has been allocated in much of the industrialized world. While data rates are higher and antennas are smaller than with other frequencies, the read ranges are often shorter. A benefit of using this frequency exists due to the world wide allocation of this frequency which means that products may be deployed around the world with little or no modification to the RHD label.
The amount of information which is able to be carried by a RFID label is be quite large. One commercial implementation of a RFID label is marketed by Texas Instruments under the name Tag-It. These commercially available RFID labels provide 256 bytes of user programmable read/write memory partitioned into eight 32 byte blocks. A ninth block contains revision and manufacturing information, while a tenth block contains a unique 32 byte ID code sequentially assigned during manufacturing which is able to provide 4.3 billion unique label identities. Other designs including more or fewer programmable bytes are also available. The distance at which the readers may read the memory information from the RFID label depends on environmental conditions and obstructions, and for the TI Tag-It label is roughly equivalent to distances achievable by state of the art hand held CCD bar code scanners. However, whereas bar codes must be visible and relatively close to the reader in order to be read, the RFID label may be hidden from view, and depending on the design, may be read from several feet away, perhaps even 100 yards away without human intervention.
In addition to increasing the distances at which RFID labels may be utilized, the technology associated with RFID continues to increase the number of RFID labels which may be read simultaneously by a single reader. Various systems exist for simultaneous RFID tag communication. One such method marketed by Texas Instruments is known as SID (Simultaneous Identification) and is currently able to read thirty tags per second. The SID algorithm uses a binary tree search through the unique code stored in the RFID label, using commands that can silence tags momentarily to allow the read of information from other tags. Another system takes advantage of a pseudo random number generator within the RFID label to command the tags to stop transmitting until a generated pseudo random number counts down. In this way, the probability of two tags counting down to the same pseudo random number and beginning to retransmit simultaneously is sufficiently low to allow proper operation of the system.
While the RFID label system promises great advances in the field of product tracking and inventory control, its ability to prevent theft is somewhat limited. Specifically, since the RFID labels are placed on product packaging, a thief would merely need to remove this label from the packaging in order to defeat any further tracking of the product. Alternatively, a thief would simply need to remove the product from the packaging to also defeat further product tracking. A product so stolen remains fully operational, and therefore, has a high black market value.
While the removal of the RFID label from the product packaging could be overcome by installing this label within the product itself, limitations on the distance at which a product may be scanned, the time required to complete the scan, and the reduced ability to scan information through obstacles greatly reduces the ability of these RFID) labels to provide theft deterrence. Specifically, products could be removed from a warehouse by placing an appropriate shield between the product and the readers to prevent detection of the theft at the first instance. However, even if the readers were able to detect the actual theft of the products, since these products remain fully operational and since the ability to detect the RFID label over distance and through obstacles in very difficult at the power levels of conventional RFID labels, the probability of recovering the stolen merchandise is very small once sold on the black market. Theft during transit of these products is even less problematic for the thief since there are no readers to defeat which would provide initial detection of the theft. 1995 estimates of theft within the freight industry alone is $10 billion dollars. This equates to 2.5% of $400 billion dollar industry.
One of the reasons for such a high volume of theft, as mentioned briefly above, is because the electronic devices are so enjoyable to own. The continued advances with the consumer electronics have greatly simplified their use both in terms of programmability and user interaction. One user interaction feature with which most consumers have become quite accustomed is the ability to remotely control their TV, stereo, VCR, camcorder, etc. While several items of consumer electronics offer this remote control feature in a line-of-sight fashion with a hand held remote controller, the desire to electrically remotely control other appliances in a non-line-of-sight fashion also exists.
In order to fulfill this desire to allow remote control of home appliances, electronic equipment, lighting, etc. several systems have been developed which allow control communications over a home's, electrical wiring system. However, since most home appliances and electronic equipment do not include communications and control circuitry to allow reception of the electrical system communication control signals, many of the systems which have been developed utilize separate plug-in modules which interface between an appliance's electrical cord and the home electrical outlet. While there is currently still no universally accepted standard for this communication over a home's electrical wiring system, two protocols have emerged as the forerunners, and serve as a basis for many of the systems currently designed. The first such protocol is commercially known and marketed as the X-10 communications protocol. The second communications protocol which appears to be in wide use at this time is known as the consumer electronics bus protocol (CEBus). However, as mentioned above, neither one of these two has gained universal acceptance in the design of remotely controllable systems for home consumer appliances, lighting, etc. Indeed, several systems which claim to allow remote control of home appliances, lighting, etc., utilize their own communications protocol which does not adhere to either one of the two aforementioned communication protocol forerunners.
Exemplary systems which claim to allow remote control of home appliances, lighting, etc., may be found with reference to the following documents: U.S. Pat. Nos. 4,567,557; 5,051,720; 5,334,975; 5,400,246; 5,471,190; 5,491,463; 5,554,968; 5,570,085; 5,621,662; and European Patent Application No. 89 121025.4 bearing Publication No. 0 369 382 A2. The disclosure of each of these documents, particularly as they relate to communications protocols allowing remote communications over an electrical distribution system, are hereby incorporated by reference.
While each of the above-identified systems claim certain benefits for a remotely controllable system, none of the systems are able to distinguish individual appliances within a household, other than by their physical or programmed location within the household. Specifically, many of the above systems utilize separate control modules which are plugged into the house's electrical outlets, and may be themselves remotely controlled via communication received over the electrical wiring system. However, if one were to unplug a particular appliance from one of these modules and move it to a different physical location within the house, the remote control system has no way of knowing that this has taken place without manual user interaction. While this reprogramming may seem to be a minor problem in view of the infrequency with which most consumer electronics and appliances are actually moved within a household, in view of the fact that many people have trouble reprogramming their VCR clock, it is a problem to be avoided nonetheless.
The unacceptability of this problem may be best highlighted through an example. Assuming without admitting, that a remotely controlled system were capable of disabling a device, such as a television, at a certain time, if a parent were to disable a television set located in a child's room after 8:00 PM, a child would only have to unplug the television set from the current electrical receptacle and replug the television set into a different electrical receptacle in order to defeat the system programming and allow continued television viewing after 8:00 PM. While the parent could conceivably disable all of the electrical outlets to the child's room, such is undesirable as this would prevent the child from using a night light, clock radio alarm, etc. in his room. While this may appear to be a simplistic example, parents with kids who own video games may well disagree.
Another problem which exists from the user stand point, as discussed above from the manufacturer and transportation stand point is the ease at which these electronic devices are stolen from the home. In addition to the significant financial loss which must be borne by the homeowner as a result of a theft of these electronic devices, a significant safety risk exists to the homeowner from the presence of the thief within the home. While the presence of electronic devices may not be sole cause for home break-ins and thefts, the ease with which these items may be transported and sold on the black market certainly provides an incentive for these thieves.
A device which attempts to overcome this problem is described in U.S. Pat. No. 5,021,779, issued to Bisak on Jun. 4, 1991 for a SECURITY DFVICE. The system contemplated by this patent utilizes a receiver-dccoder which is adapted and arranged to allow the appliance to operate in its normal mode when the receiver-decoder receives a predetermined code carried via the electrical wiring system within the home. If this predetermined code is not received by the receiver-decoder, the appliance enters a security mode of operation. Various alternative security modes of operation are described in this patent including the use of an alarm within the device, to trigger a transmitter device to sound an external alarm, or to transmit a silent signal to the police department upon being plugged in to allow the apprehension of the thieves. The encoder-transmitter of this system is arranged to frequency or phase modulate a carrier signal with a binary digital code and transmit that signal over the electrical wiring system to the electronic appliance plugged into the wall socket of the household. Once a consumer has set a particular code and transmitted that code over the electrical system to the electronic appliance, that code is kept in memory and used to compare subsequent receptions to determine of the appliance is still connected within that consumer's household.
However, as with the above-described control systems, the system of the Bisak '779 patent does not allow for individual identification of electronic appliances coupled to the system. Nor does this system allow any type of control of the electronic devices coupled to the electrical system of house. Further, this security device operates on its own communications protocol operating at 260 kHz and transmitting a unique binary digital code which is suited only to the security feature. The system of Bisak '779 also does not address the problem of theft at the manufactory or transportation levels.
SUMMARY OF THE INVENTION
It is therefore an object of the instant invention to overcome many of these and other problems existing in the art. More particularly, it is an object of the instant invention to provide an electronic system of identification, control, and security for use with electronic and electrical appliances. Specifically, it is an object of the instant invention to provide an electronic system which may be utilized as part of the inventory tracking and control system at the manufacturing level, and which deters theft within the manufacturer's inventory control system. Further, it is an object of the instant invention to provide an electronic system which allows for inventory and product identification and control at the transportation level, and which also provides for theft deterrence while in transit. Furthermore, it is an object of the instant invention to provide an electronic system which allows for inventory control at the retail level and which provides theft deterrence there as well. Once purchased, it is an object of the instant invention to provide a system which is capable of individually identifying particular electronic components within a household regardless of the physical location of that device. It is a further object of the instant invention to provide a system which allows for individualized control of an uniquely identified electronic appliance within a household. Further, it is an object of the instant invention to provide a system which deters the theft of electronic devices from the household.
In view of these objects, it is therefore a feature of the instant invention to provide a system which electronically uniquely identifies each electronic appliance manufactured and sold throughout the world. It is a further feature of the instant invention to utilize this unique electronic identification system in the control and security of these electronic appliances. At least the manufacturing, distribution, transportation, and retail levels it is a feature of the instant invention to utilize RFID technology to identify, track, and secure individual products. It is a further feature of the instant invention that the RFID technology is integrated into the electronic appliances' control structure. It is also a feature of the instant invention to utilize a factory preset security code via the RFID interface which disables the electronic appliance during transit and storage until the electronic appliance is sold to a consumer. Further it is a feature of the invention to include the RFID within the appliance. It is also a feature of the invention to provide the RFID portion externally to the appliance to allow replaceability thereof with other technology communication modules, including other RFID frequency systems, power line communications, and direct modem communications modules. Additionally, it is a feature of the instant invention to utilize electronic communication over the electrical wiring system of a residence to communicate the individual identities, control, and security codes generated by the system.
As may be apparent to one skilled in the art from the foregoing, the system of the instant invention provides a method for deterring theft of manufactured articles. In a preferred embodiment the method comprises the steps of providing a unique universal product protection code (UPPC) for each manufactured article, transmitting a password via radio frequency to each manufactured article, and disabling operation of each manufactured article in response to receipt of the password. The method further comprises the steps of associating the UPPC with the password in a computer system, receiving UPPC information from a user for a particular manufactured article, recalling the password associated with the UPPC information for the particular manufactured article, and transmitting the password to the user to enable operation of the particular manufactured article. Preferably, the method further comprises the steps of interrogating at least one manufactured article for the UPPC information prior to transport, storing the UPPC information in a computerized shipping system, interrogating the manufactured article for the UPPC information upon receipt of the manufactured article, and comparing the UPPC information stored in the computerized shipping system with the UPPC information interrogated upon receipt to confirm receipt of the manufactured article transported.
The method preferably further comprises, before the step of transmitting a password via radio frequency to each manufactured article, the steps of interrogating at least one manufactured article for the UPPC information prior to transport, storing the UPPC information in a computerized shipping system, and generating the password in the computerized shipping system. A preferred method further comprises the steps of interrogating the manufactured article for the UPPC information upon receipt, comparing the UPPC information stored in the computerized shipping system with the UPPC information interrogated upon receipt to confirm receipt of the article transported, and transmitting the password from the computerized shipping system to the manufactured article to enable its operation.
A preferred method of the instant invention further comprises the steps of transmitting the associated UPPC and password information to a central computerized system, interrogating the manufactured article at a point of purchase to retrieve the UPPC information, retrieving the password associated with the UPPC for the manufactured article, and transmitting the password to the manufactured article at the point of purchase to enable its operation. Further, a preferred method comprises the steps of energizing the manufactured article, setting a user defined password for the manufactured article, and disabling operation of the manufactured article upon loss of energization. Additionally, a preferred method further comprises the steps of energizing the manufactured article, entering the user defined password for the manufactured article to re-enable its operation. Preferably, the method further comprises the steps of storing the user defined password and the UPPC in a computer system, transmitting the UPPC to the computer system upon energization of the manufactured article, and transmitting the user defined password to the manufactured article to enable its operation. Additionally, a preferred method further comprises the steps of periodically interrogating the manufactured article to determine its presence and enunciating the absence of the manufactured article in response to a lack of response to the step of periodically interrogating.
A preferred system of the instant invention for deterring theft of manufactured articles comprises a unique identification code associated with each manufactured article, a password code, communication circuitry capable of transmitting the password code to the manufactured articles, and appliance disabling circuitry suitable for integration with the manufactured articles. This appliance disabling circuitry precludes operation of the manufactured articles upon receipt of the password code. Preferably, the system further comprises a computerized database. This said computerized database stores the unique identification code in association with the password. In a preferred system, the communication circuitry comprises an RFID interrogator and an RFID device. Preferably, the RFID device is suitable for integration within the manufactured articles. The system also preferably comprises communication interface circuitry interposed between the communication circuitry and the appliance disabling circuitry. In this embodiment, the RFID device removably interfaces with the communication interface circuitry. The system may also preferably comprise secondary communications circuitry capable of transmitting the password code to the manufactured articles.
A manufactured appliance in accordance with a preferred embodiment of the instant invention comprises security and control logic circuitry, data storage memory, a unique identification code stored in the memory, and communication circuitry capable of receiving a transmitted password. Preferably, the security and control logic disables operation of the manufactured appliance in response to receipt of the password. In a preferred embodiment the communication circuitry is an RFID device. Further, a preferred appliance comprises secondary communication interface circuitry capable of receiving the password from an external communication system.
In a preferred embodiment of the instant invention, an electronic identification, control, and security system comprises an electric power distribution network having a plurality of electric conductors and a plurality of electrical outlets providing electrical coupling thereto, a controller electrically coupled to the electric power distribution network through one of the electrical outlets, and an appliance electrically coupled to the electric power distribution network through one of the electrical outlets. Preferably, the appliance includes security and control logic, a communication interface interposed between the logic and the electric power distribution network, and circuitry or software for disabling operation of the appliance which is controlled by the logic. Tile controller transmits individualized information to the appliance via the electric power distribution network. This individualized information is independent of a physical location of the appliance.
In a preferred embodiment, the controller is a personal computer having a controller, a display, a user interface, and a communication module interposed between the controller and the electric power distribution network. Alternatively, the controller may be a portable unit having, a microcontroller, a display, a user interface, and a communication interface interposed between the microcontroller and the electric power distribution network. Preferably, this portable unit further includes a personal computer interface port.
In such a system in accordance with the teachings of the instant invention, the appliance includes a unique identification code stored therein. The individualized information transmitted by the controller contains an address portion containing the unique identification code. This unique identification code may be set by a manufacturer of the appliance, and may be reset by the consumer.
Preferably, the appliance also includes a security code stored therein. In this case, the individualized information contains the security code to allow operation of the appliance. The controller may periodically transmit the individualized information containing the security code, in which case the security and control logic commands the circuitry or software of the appliance to disable its operation in the absence of receipt of the this individualized information after a predetermined time. Alternatively, the security and control logic commands the circuitry or software of the appliance to disable its operation in the absence of receipt of the individualized information containing the security code after a predetermined time from electric coupling to the electric power distribution network. As an alternative embodiment, the security and control logic commands the circuitry or software to enable operation of the appliance upon receipt of the individualized information containing the security code.
In a preferred embodiment of the instant invention, the individualized information contains a control portion, and the logic is responsive to this control portion to control operation of the appliance. The controller generates this control portion in response to user commands, or alternatively in response to a user defined operational program.
In accordance with the teachings of the instant invention, an appliance for use in an electronic identification, control, and security system comprises an electric power connector adapted to couple the appliance to the electric power distribution network via an electrical outlet, security and control logic, a communication interface interposed between the logic and the electric power connector, and circuitry or software for enabling and disabling operation of the appliance. Preferably, the circuitry or software is controlled by the logic. This appliance preferably further comprises a unique identification code stored therein. Using this, the logic responds only to messages containing the unique identification code. Additionally or alternatively, the appliance further comprises a security code stored therein. The logic then may command the circuitry or software to enable operation of the appliance upon receipt of the security code. The logic also commands the circuitry or software to disable operation of the appliance after a predetermined time from last receipt of the security code.
A portable controller for use in this electronic identification, control, and security system preferably comprises an electric power connector adapted to couple the controller to the electric power distribution network via an electrical outlet, a microcontroller, a memory storage device, a display, a user interface, and a communication interface interposed between the microcontroller and the electric power connector. The microcontroller generates individualized information for transmission by the communication interface to the appliance via the electric power distribution network. Additionally, this portable controller may further comprise a computer interface port.
In accordance with an embodiment of the instant invention, the microcontroller generates security code information for transmission by the communication interface to the appliance via the electric power distribution network in response to user input from the user interface. The microcontroller periodically generates this security code information for transmission by the communication interface to the appliance via the electric power distribution network. Preferably, the appliance includes an unique identification code. The portable controller stores this unique identification code in the memory storage device and includes it in the individualized information.
Further in accordance with the teachings of the instant invention and for use in association with an appliance in an electronic identification, control, and security system, an adapter comprises security and control logic, a communication interface electrically coupled to the logic and the electric power distribution network, and circuitry or software for enabling and disabling operation of the appliance. This circuitry or software is controlled by the logic and electrically interposed between the outlet and the electric power connector of the appliance.
These and other aims, objectives, and advantages of the invention, will become more apparent from the following detailed description while taken into conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a system overview communications diagram of a system constructed in accordance with the instant invention;
FIG. 2 is a system level state diagram functionally illustrating aspects of the instant invention;
FIG. 3 is a system level state diagram illustrating system level states in an alternate embodiment of the instant invention;
FIG. 4 is a system level diagram illustrating an implementation of the teachings of the instant invention at the manufacturing, transporting, and warehousing stages;
FIG. 5 is a system level diagram illustrating an implementation of the teachings of the instant invention at the retail sale phase;
FIG. 6, is a system level diagram illustrating an implementation of the teachings of the instant invention in the consumer home and office phase;
FIG. 7 is a single line block diagram illustrating an embodiment of the instant invention;
FIG. 8 is a single line block illustrating an alternative embodiment of the instant invention;
FIG. 9 is a single block diagram illustrating a further alternative embodiment of the instant invention;
FIG. 10 is a system level single line block diagram constructed in accordance with an embodiment of the instant invention;
FIG. 11 is a simplified component block diagram in accordance with an aspect of the instant invention;
FIG. 12 is a simplified component block diagram illustrating a further aspect of the instant invention;
FIG. 13 is a simplified component block diagram illustrating an alternate aspect of the instant invention;
FIG. 14 is a simplified block diagrammatic illustration of a portable control unit in accordance of the teachings of the instant invention; and
FIG. 15 is a simplified block diagrammatic illustration of an alternate embodiment of a portable control unit in accordance with the teachings of the instant invention.
While the invention is susceptible of various modifications and alternative constructions, certain illustrative embodiments thereof have been shown in the drawings and will be described below in detail. It should be understood, however, that there is no intention to limit the invention to the specific forms disclosed, but on the contrary, the intention is to cover all modifications, alternative constructions and equivalents falling within the spirit and scope of the invention as defined by the appended claims.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
To gain an understanding of the value and benefits of the system of the instant invention, an overall system level understanding is provided with reference to FIG. 1 before the design details of any aspect of a particular embodiment of the invention is discussed. With the system of the instant invention, both inventory tracking and theft prevention may be accomplished. At the manufacturing level 10 individual appliances are constructed with security circuitry which allows the device to be disable and prevented from operating until such time as the appliance is re-enabled. In an embodiment of the instant invention the security circuitry includes an RFID interface to allow RF transmission and tracking of the individual appliances through the manufacturing and inventory process. From the security aspect of the invention a manufacturer sets a password through the RFID interface to disable the appliance from further operation. The RFID information also includes an unique appliance identification number known as a Universal Product Protection Code which may then be utilized for tracking of the product through the manufacturing and inventory process. Once the manufacturing process is complete and the appliance is ready to be shipped, the manufacturer may then send the Universal Product Protection Code (UPPC) information and the associated password to a data commerce and warehouse system. Since the appliance will remain in the disabled state until the password is transmitted to the appliance to enable operation thereof, theft of the appliance is deterred.
Once the transportation phase of the appliance life cycle is complete, the retail store 26 may then reenable the product for sale. To reenable operation of the product, the retail store 26 reads the serial number and requests transmission of the password from the data commerce and warehouse 40. Once the retail store has transmitted the password to the appliance, the appliance will operate in a normal fashion. As will be discussed more fully hereinbelow, the request for the password and reenabling of the appliance may take place as part of the point of sale through an automated credit card system. In this way the retail store will be assured that theft of the appliances while in the stores own inventory will be deterred. If the particular appliance is acquired by a business organization 17, that business organization can set a unique or corporate password to allow operation of the device while plugged in within the business organization. Once the password is transmitted to the appliance, it will continue to operate in a normal fashion until it is de-energized, typically by being unplugged. Once power is restored to the appliance, the appliance will enter a security mode of operation whereby normal operation will be precluded until transmission of the previously set password is transmitted to the appliance. Once again, theft of the appliance while at the business organization 17 is deterred. This password may be transmitted to the data commerce and warehouse 40 to provide a central electronic warehouse of the required enabling passwords in so desired. Additionally, because the system includes the TPPC which is unique for each appliance, a security service 19 may be notified upon detection of the unplugging of a device (the details of which will be provided more fully below).
If, on the other hand, the appliance is purchased from the retail store 26 by a consumer 30, it is the consumer who then may set a personal password for the appliance to allow its operation while plugged in to the consumer's dwelling. As with the business organization 17, the setting of the password by the consumer 30 will allow normal operation of the appliance until the appliance is de-energized, typically by unplugging the unit. Once the electronic appliance is plugged in or otherwise energized, it will enter the secure mode of operation precluding further operation until transmission of the personal password is complete. As discussed above, the theft of this appliance is therefore deterred. Also analogous to the business organization 17, the consumer 30 may transmit the UPPC and password information to the data commerce and warehouse 40 to provide a central registry of this information for disaster recovery and product retrieval in the event of actual theft. Likewise, the system of the instant invention at the consumer's dwelling may be programmed to contact a security service 19 for various theft related conditions such as the detection of more than one appliance being unplugged in a short period of time. The preferred mechanism for setting such a password in the consumer environment 30 is a personal computer or a hand held encoder/decoder as will be discussed more fully below.
While the system of FIG. 1 illustrates the use of a central data commerce and warehouse 40, one skilled in the art will recognize that such a centralized electronic data commerce and warehouse may not be desired. Such a system is illustrated in state diagrammatic form in FIG. 2 to which specific reference is now made. The discussion of this alternative embodiment of the system of the instant invention will focus on the functional operation of the system, highlighting each step of the manufacturing, transportation, distribution, and retail stage. In accordance with the teachings of the instant invention, therefore, an appliance manufacturer 10 manufactures an appliance having some form of functional electronics incorporated therein. During the manufacturing process, the appliance manufacturer 10 individually secures the appliance, as will be described more fully hereinbelow, to preclude any internal theft 12 of the appliance. Once the manufacturing process is complete, the appliance is transported 14 through the mails, via a common carrier such as a trucking company, a shipping company, or a train. Since the appliance is shipped from the appliance manufacturer 10 in a secured state, hijacking 16 of the appliance during transportation is no longer viable since a highjacked appliance cannot be operated, and therefore has an extremely low black market fence value. The secured appliance, therefore, will arrive at a distribution center 18 still in a secured state. From the distribution center 18, the appliance is then transported 20 to the various retail stores 26. Also during this phase of transportation 20, the highjacking, 22 of the appliance is equally disadvantageous due to the secured state of the appliance. Having arrived safely, the appliance may be stored in a stock room 24 until it is sold at the retail store 26.
In one embodiment of the instant invention, the retail store 26, upon successfully negotiating a purchase 28 with a consumer 30, requests security information 32 from the appliance manufacturer 10. In response, the appliance manufacturer 10 sends security information 34 to the retail store 26 to allow the appliance to be placed in an unsecured state at the time of purchase 28. Alternatively, the security information may be provided to the consumer either directly from the manufacturer 10 or through the retail store 26. In one embodiment, the appliance is provided with a fixed password which is provided to the consumer 30 to allow operation of the appliance.
Upon returning home with the purchased appliance, the consumer 30 may then secure the appliance as will be described more fully hereinbelow. Additionally, the consumer 30 may also register 36 the appliance with the appliance manufacturer, receiving a registration acknowledgment in response, to allow warranty claims and replacement 38 of appliance components in the future. These warranty claims and replacements 38 are indicated in FIG. 2 as being an unauthorized state which may actually be either (1) unsecured, or (2) set with a manufacturer password or a password which is communicated to the manufacturer to allow operational testing and repair of the appliance.
In the hands of the consumer 30, the appliance is in a user definable state. The user, in accordance with the teachings of the instant invention, may choose to secure the appliance from future theft, or may choose to leave the appliance in an unsecured state by simply failing to set the security feature within the unsecured appliance. The method for setting the security feature within the appliance, as well as the system used to provide this security, will be described more fully hereinbelow.
In an alternate embodiment of the instant invention which is more closely linked to that of FIG. 1, as illustrated in FIG. 3, a central or distributed registration authority 40 is included within the system to provide central security and database tracking of security information for manufactured appliances to aid in the security, authentication, and theft recovery of consumer appliances. In this embodiment of the instant invention, the appliance manufacturer first sends security information for each of the appliances manufactured and secured therein to the registration authority. The registration authority 40 stores this security information for each manufactured appliance for later coordination and retrieval, and sends a security acknowledgment 44 to the appliance manufacturer 10. This indicates that the registration authority has successfully registered the secured appliance.
With this central authority 40, the retail store 26 no longer needs to communicate directly with the appliance manufacturer 10, but instead may request security information 46 directly from the registration authority 40 upon the negotiation of a purchase 28 with a consumer 30 of the secured appliance. In response, the registration authority 40 transmits 48 the security acknowledgment to the retail store 26 so that the appliance may be placed in the unsecured state, allowing the consumer 30 to later operate the appliance. Once in the hands of the consumer 30 the appliance is now in a user definable state wherein the user may, as described above, either choose to secure the appliance, or leave it in an unsecured state. Should the consumer decide to place the appliance in a secured state, he may do so without further required interaction with any other party. Alternatively, he may secure the device through a consumer registration communication 50 with the registration authority similarly as described above. Once the consumer registration information has been stored by the registration authority 40, a security acknowledgment 50, which may be a password, is transmitted to the consumer 30 via voice or modem communication. This password may then be utilized in one embodiment of the instant invention to unlock the consumer's ability to set his or her own password via the voice or modem communication. Security for this information transfer may be provided through any available means of encryption as appropriate.
In addition to the security and UPPC information which may be transmitted to and from the registration authority 40, once the appliance has been purchased from the retail store 26 consumer registration and warranty information received from the consumer 30 may be transmitted via the registration authority 40 to the appliance manufacturer 10. The registration authority 40 may also transmit manufacturing specifications, diagnostics, help, and other user manuals directly to the consumer 30 if so desired. The registration authority 40 also provides a mechanism for automatic notification of recall information or other safety issues which must be transmitted to the consumers 30 who have purchased the particular products for which this information is needed.
With this overall system level understanding of the invention in hand, a more detailed locus at each phase of the manufacturing, distribution, and retail sale of the appliance is now appropriate. Beginning with the manufacturing phase, and with reference now to FIG. 4, a manufacturer 10 encodes each individual appliance with a unique Universal Product Protection Code (UPPC) and a security password via a radio frequency transmission of this information. Preferably, an RFID reader or interrogator 21 is utilized in the manufacturing process to transmit this information directly to the individual appliances. This information is generated and stored by the manufacturer's business system 23 which typically has been used to track inventory and other information relating to the manufacturing process. In a preferred embodiment, each individual appliance is manufactured with a unique UPPC which is first read by the RFID interrogator 21 and transmitted to the business system 23. The business system 23 then preferable transmits to the interrogator 21 the security password information to be encoded into the individual appliance. The UPPC/password information is correlated and stored within the business system. This information may be transmitted from business system 23 to the registration authority 40 at any point during the manufacturing process, and is preferably transmitted as part of an online shipping system 25 used in association with the transportation provider.
When the system of the instant invention is utilized with an online shippingsystem 25, the shipping carrier 27 may verify the contents of the cargo through the use of an RFID interrogator 31. This interrogator 31 may utilize simultaneous communication techniques with the RFID system to allow verification of cargo contents without requiring individual scanning of the individual products on a shipping pallet. The information received through the RFID interface may be entered into the online system 25 via an encoder interface 33 which utilizes either an RF or docking station type interface with the interrogator 31. Once the information concerning the specific identity of each of the appliances being shipped is entered into the online shipping system 25 this information may be transmitted to the registration authority 40. Because the appliances have all been disabled at the manufacturing level 10 via the transmission of the password, theft in transit due to hijacking is greatly deterred. Alternatively, the shipping carrier may set its own password to maintain control over the shipment.
Once the cargo 35 arrives from the shipping carrier 27 at the warehouse, verification of the specific contents of the cargo 35 may be verified by interrogating this cargo 35 via an RFID interrogator 37. Once the interrogator 37 has retrieved all of the UPPC information, it may then verify receipt of all shipped goods via its own online shipping system 39 once the information has been transmitted thereto via the encoder interface 41. The verification may be made via communication with the registration authority 40 as illustrated in FIG. 4, or through communication with its own internal online shipping system as desired.
The next phase of the product life cycle is the retail market which also integrates into the system of the instant invention as illustrated in FIG. 5. A preferred retail system will utilize an RFID interrogator 51 which is linked to an electronic transaction terminal point of sale system 53. This point of sale system 53 is preferably tied to the retail store's inventory control system which utilizes the product's UPPC. The point of sale system 53 may preferably communicate automatically to the central data base or registration authority 40 to retrieve the product's password to enable operation thereof. Once retrieved, the interrogator 51 transmits this password information to the electronic appliance, thereby enabling its operation for the consumer 30. Alternatively, the store may well decide to utilize its own internal password to enable and disable the operation of the appliances. In such an event, the communication link to the registration authority 40 would not necessarily be required, and could be replaced by a communication link to the store's own computerized data base which stores this information.
Once purchased, the consumers will typically install the electronic appliance in their home or office environment 55 as desired. Once in this environment, the consumer may register his purchase with the registration authority 40 by transmitting the UPPC and other information via a modem 57, via voice communication over the telephone 59, or even via facsimile 61. Once this information identifying the electronic appliance and the particular consumer is received by the central registration authority 40, appropriate portions of this information is then communicated to the consumer warranty registration system 63 of the appropriate appliance manufacturer.
To allow for the above described system operation, a preferred embodiment of the instant invention incorporates within an electronic appliance a RFID device 65 as illustrated in single line block diagrammatic form in FIG. 7. As may be seen, the RFID device 65 includes a coil type antenna 67 which receives the transmitted RF signal 69. This transmitted RF signal includes both information and power, and serves both to energize the RFID device 65 as well as transmit information thereto. As discussed above, the RUID device 65 communicates with the interrogator (not shown) via a technique known as backscattering. Preferably, this RFID device 65 is integrated into the electronic appliance and communicates directly with the security and control logic 71 thereof. This security and control logic 71 includes permanent data storage 73 as is conventional. This permanent data storage 73 may maintain the UPPC and password information required by the system of the instant invention, or this information may be stored in the RFID device 65 itself as is common with conventional RFID devices. In any event, this information is coordinated through the security and control logic 71 of the appliance to disable operation of the appliance via a disabling device 75. This disabling device may take the form of control logic which prohibits operation of the appliance, hardware circuitry to prevent operation of the appliance, or a combination of both as appropriate for the particular appliance into which the system is incorporated.
A preferred embodiment of the instant invention also includes a communication bus 77 which interfaces with a communication interface 79 to allow hardware communication from the appliance to external devices. This communication interface 79 may be an external module which couples to the appliance through a communication bus port and cable connector 81. Use of an external module allows for wide adaptability of the system to multiple communication platforms within the home or office. Alternatively, the communication interface may be integrated within the appliance as desired.
An alternative embodiment of the instant invention utilizing an external RFID interface is illustrated in FIG. 8. In this embodiment, an external RFID module 83 which contains the conventional components of a RFID device 65 and coil 67 is interfaced to the appliance via a communication bus port and cable connector 85. The information to and from the appliance will be transmitted through a communication bus 87 to the appliance's security and control logic 89. In similar fashion to the embodiment described above, the security and control logic 89 of the appliance interfaces with permanent data storage 91 and controls the operation of a disabling device 93 which may comprise both hardware and software components as appropriate. The use of the external RFID module 83 allows for wide applicability of the system of the instant invention as it does not specifically tie the appliance to any one particular frequency of operation (,See Background of the Invention section for discussion of the available frequencies currently in use for RFID devices). Such an external system allows a manufacturer to use its existing RFID equipment without having to worry if this is compatible with the shipping company or the retail outlet which may utilize different RFID frequency systems.
As illustrated in FIG. 9, the structure of this embodiment allows for other topology communication interfaces 95 to be coupled to the system via the cable connector and communication bus port 85. These other topology communication interfaces 95 allow widespread applicability of the system of the instant invention as the requirement for RFID interfacing equipment is no longer needed at separate stages of the product life cycle. For example, such an interface may allow direct modem communication with the appliance. This communication interface 95 may transmit the UPPC and password information to and from the appliance to allow the securing and control thereof.
In an alternative embodiment, the securing of the appliance once in the possession of the consumer is accomplished once the appliance has been plugged in to the electrical distribution network in the home or office of the consumer, as illustrated in simplified block diagrammatic single line form in FIG. 10. As illustrated in this figure, the electric utility source 52 supplies electric power to the power distribution network 54 for electric power distribution throughout the home. This distribution network 54 comprises the wiring and electrical outlets, as well as the circuit breakers and switches commonly used in a home, office, or other consumer location. As the individual appliances, illustrated as a television set 56, a video player 58, a stereo 60, and a computer printer 62, are plugged into the distribution network 54 via their individual power cords (64, 66, 68, and 70 respectively), they receive electric power for operation, and are also now capable of individually receiving the security information to place them into a secured state. This security information is communicated to the individual appliances via the electric power distribution network 54 through a conventional electric power distribution communications protocol, such as X-10 CEBus, or other appropriate communications protocol. Preferably, the communication and coordination of the security information is contained within a consumer s personal computer 72 which is also plugged into the electric power distribution network 54 by power cord 74. Alternatively, or additionally, the security information may be communicated to the appliances via a portable hand held device 76 which is plugged into the electrical system via a common electrical outlet by power and communication cord 78. While FIG. 10 illustrates the use of both a personal computer 72 as well as a hand held device 76, one skilled in the art will recognize that the use of both of these is not required as much of their functionality in this context is duplicative. However, for enhanced security of the appliances, including the personal computer 72, the hand held device 76 may be utilized.
When the personal computer 72 is utilized to transmit security information over the electrical power distribution network 54, it preferably includes a communications module 80 which is coupled to the electric power cord 74 as illustrated in block diagrammatic form in FIG. 11. As may be seen from this simplified block diagram, the communications module 80 interfaces directly with the main controller 82 of the PC 72. In conventional manner, the PC 72 typically includes a display device 84, a keyboard or other user interface 86, the capability of printing a hard copy 88 when desired. The communication module 80 may vary depending upon the particular electric power system communications protocol chosen and may be, in a preferred embodiment, an X-10 CM11A which includes an RS-232 serial port 90 as its communications interface with the controller 82. Obviously, a different communication module 80 may be needed if a different communication protocol were chosen.
With respect to the appliances. FIG. 12 illustrates a simplified block diagram of an exemplary appliance constructed in accordance with the teachings of the instant invention. This exemplary appliance 92 contains internal electronics 94 which produce the appliance functionality, and which include a power supply section 96 which conditions the electric power from the AC power connection 98 for use by the control electronics 94. In the embodiment illustrated in FIG. 12, the communication interface 100, which may be preferably an X-10 CM11A communications module, interfaces directly with the AC power connection 102 which is coupled to the electric power distribution network (not shown). The communication interface module 100 preferably communicates via an RS-232 serial port 104 with the security and control logic module 106, which may be a PIC16C73 microprocessor, or other appropriate processing means.
The security and control logic 106 exchanges data with a permanent data storage device 108 which contains, for example, the unique appliance identification, the security code set by the system, etc. The security and control logic 106 also coordinates the operation of a disabling device 110 which is preferably interposed between the electric power connection 102 to the electric power distribution network (not shown) and the connection of electric power 98 to the power module 96 of the appliance 92. In this way, the power to the appliance electronics 94 may be commanded on or off by the security and control logic 106 in response to communications transmitted over the electric power distribution network and received by the communication interface 100. While FIG. 12 illustrates the communication and control element 112 as internal to the appliance 92, one skilled in the art will recognize that such a communications element 112 may be externally mounted from the appliance 92 as an adapter. This will allow for increased applicability of the system of the instant invention to existing appliances which do not have, or were not designed for internal communications and control mounting of element 112. In such an embodiment, the communication and control element 112 would form an adapter and could simply be interposed between the electrical wall outlet and the end of the power cord for the appliance.
An alternate embodiment of an appliance 114 suitable for use with, and incorporating the teachings of the instant invention is illustrated in FIG. 13. In this embodiment, the appliance 114 incorporates the security and control logic functionality 116, the permanent data storage elements 118, and the disabling device or method 120 within the appliance functionality electronics 122. Preferably, the communication interface 124 is still a separate module allowing for the interchangeability with different communications protocols depending upon a consumer's preferences for his internal electric power distribution network communications system. In this embodiment, the disabling device or method 120 performs the functionality of disabling the appliance when commanded to do so, or in response to the security features of the system. This functionality may be performed electronically within the microprocessor functionality control by disabling processor operation, or may be a disabling type relay used in conjunction with the power supply for the appliance. If this second option is employed, the relay should be installed such that stored parameters and presets within the appliances are not reset. Other implementations of the disabling functionality of element 120 may be utilized as appropriate, and it is the intent of this application to cover all such implementations.
As described above, this system may also operate with a portable hand held unit 76, a simplified block diagram of which appears in FIG. 14. As may be seen from this figure, the hand held unit 76 includes an AC power connection 126 which is plugged into the standard wall outlet of the electric power distribution network (not shown). The AC power coupled by this connector 126 is used conventionally by an internal power supply 128, and also is connected to the power line communication interface module 130. This power line communication interface module 130 may be of the type described above, or may be a universal communications protocol unit which allows for electronic communication over the electric power distribution network using multiple communications protocols. Preferably, however, this power line communication interface module 130 communicates via the X-10 communications protocol.
The power line communication interface 130 communicates with and is controlled by a microcontroller 132, which may be preferably a PIC16C74 microcontroller. This microcontroller 132 coordinates the control and security functions of the system, and transmits and receives the required information over the electric power distribution network as described above. The hand held unit 76 also includes a display, such as liquid crystal display 134, to allow display of required information to the user. Additionally, a user keypad 136 or other user interface is included to allow consumer input to the microcontroller 132. The microcontroller 132 also interfaces with a permanent data storage module 138 which is used to store the security and identification information of the coupled appliances installed within the system.
While not required, the hand held unit 76 may preferably utilize the serial interface 140 of the microcontroller 132 to provide communication with, for example, a user's personal computer 144. Preferably, the serial interface 140 will utilize an RS-232 level translator 142 to provide adequate signal level communication with the user's personal computer. Alternatively, the translator 142 may be replaced with a modem to provide remote communications via a telephone line. In either case, the hand held unit 76 may “dump” collected and stored data on appliance power usage, operating states, etc. To collect this data, the hand held unit is plugged into a wall socket for a period of time to allow it to communicate with and store data from the appliances coupled to the system.
An alternate embodiment of the portable unit 76 of the instant invention is illustrated in block diagrammatic form in FIG. 15. In this embodiment, the power line communication interface module 146 is an external device which, through replacement, allows the unit 76 to be utilized with multiple communication protocols. This communication interface 146 may be a plug-in module or card which plugs into the unit 76, or may be a separate module which is interposed between the AC power connection and the input to the unit 76 itself. In a preferred embodiment of the instant invention, the communication interface module 146 is an X-10 CM11A power line communication interface module. In this configuration of the hand held unit 76, the serial interface 140 of the microcontroller 132 is utilized for the communication with the communication interface module 146. Preferably, an RS-232 level translator 142 is utilized for this function.
Having undertaken a description of the hardware system components in the electronic identification, control, and security system of the instant invention, the description now turns to the system functionality implemented thereby. As the system has many aspects and broad functionality, the following description will attempt to present a logical progression of the use of the system from original manufacture through purchase, installation, control, and attempted theft.
As described above with reference to FIGS. 1 and 2, the security feature of the instant invention may preferably first be set by the appliance manufacturer to prevent internal theft, or theft during the transportation and final distribution to the retail outlet. This would be accomplished by the appliance manufacturer setting the internal security code to disable the appliance from operation. The unit would then be in the secured state, requiring that the security code be input to unlock the device and allow operation thereof. In one embodiment of the instant invention, a separate lock and unlock security code could be implemented to control the security of the appliance. Preferably however, the system would utilize a watch dog timer type arrangement whereby periodic reception of the required security code would be needed to maintain the appliance in an operational mode. That is to say, the appliance would continually or periodically look for the security code to be received from the electrical power distribution network to ensure its continued existence at a particular consumer location. If the appliance were not to receive the security code within its timeout period, it would automatically enter a non-operational security state, precluding further operation of the appliance until such time as its security register were reset, or otherwise were to receive the proper security code. In this way, theft of the appliance would be discouraged, because operation of the appliance would be prevented without knowing the security code with which that particular appliance had been programmed.
Once purchased by consumer, the retail store could either reset the security register such that the appliance would be in an unsecured state allowing operation of the appliance without the need for transmission of a security code signal, or the retail store could provide the consumer with the preset security code to allow operation of the appliance in their home by utilizing the system of the instant invention. With the system of the instant invention, the consumer may set the security code to a common code for all appliances owned by that particular consumer encoupled to his electric power distribution network. This would be accomplished either through the hand held unit described above or through the personal computer interface also described above.
In an embodiment of the instant invention whereby a personal computer is utilized to coordinate the security features of the instant invention, the personal computer preferably periodically transmits the security code over the electric power distribution network to maintain all appliances coupled thereto in an operational state. However, as this embodiment requires that the personal computer continuously, periodically transmit information over the electric power distribution network, the system may alternately utilize a security set mode whereby an appliance would be enabled via transmission of the security code, and would continue to operate normally until the unit is unplugged from the electric power distribution network, or electric power is otherwise removed therefrom. Once electric power has been removed and reapplied to the appliance, the system would function to preclude operation of the appliance until reception of the security code as previously set by the system. This would preclude theft of the device by locking out further functionality of the appliance once it has been unplugged and removed from the residence of the consumer. In this embodiment, the system would include a power delay timeout which prevents the lock out from operating for a given period, e.g., 15 seconds, following the loss of power. This power delay timeout prevents the necessity of initiating a password reset due to a power transient. This type of functionality is particularly desirable when the system is operated with the hand held unit described above. In this way, the hand held unit need only be utilized initially upon installation of the appliance, and after each power loss to the appliance.
To prevent the compromise of a single security code jeopardizing the security of all appliances either manufactured by an appliance manufacturer or installed within a consumer location, the system of the instant invention also contemplates the ability to set individual security codes for individual appliances. This is accomplished in the instant invention through the use of an individualized identification code stored within or otherwise associated with individual appliances. In this way, a matrix would be established within the system to associate each individual appliance with its particular security code. Advantageously, the use of this individualized appliance identification code also allows for individualized control of the appliances via the communication network over the electric power distribution system at the consumer location. As described above, the individualized addressed message would be ignored by all other appliances coupled to the electric power distribution network, and would only be acted upon by the particular appliance to which the message was directed.
While the particular format of the individualized identification information for each appliance may take any suitable form which allows for individual identification and addressing of the appliance, a preferred format will be described hereinbelow. Specifically, a preferred implementation of the electronic identification information takes the form of a twenty byte word. Preferably the word is segmented to allow for five bytes for UPC information identifying the make, model, etc. of the appliance, four bytes to identify the manufacture date, one byte to identify the shut down current threshold information to allow the system of the instant invention to coordinate control and load shed operations which will be described more fully hereinbelow, five bytes for the security code, and an additional five bytes for the lot number of the appliance. While not all of this information is required to allow the aforementioned security functionality of the system, it is included for enhanced control features as will be described below.
Through the use of the individualized identification of the various appliances installed in a consumer location, the system of the instant invention may be utilized to coordinate the functionality of these appliances through the centralized communication and control provided by the system. Control of the individual components may be coordinated through the consumer's personal computer 72 (see FIG. 10), or may alternatively be coordinated through the hand held device 76. Using either implementation, the consumer would access the system of the instant invention, selecting the appliance ID, and performing the desired control functions thereon. For example, the consumer may set hours of operation for individual appliances so that they may be used only during certain hours of the day. This programming would be maintained even if the particular appliance were removed from its current physical location within the consumer residence and moved to an alternate location. Regardless of that particular appliance's physical location within the consumer's residence, at the appointed hour the system would transmit an individualized addressed message disabling the appliance from further operation until the appointed hour for its reenablement. In addition to coordinated programming of the operation of various appliances, the system may be utilized to control the operation of the various appliances at that particular time. As will be recognized by one skilled in the art, such coordinated control of individual appliances through a personal computer would also allow for remote control of these appliances through external modem communications with the personal computer 72.
The system of the instant invention may also be utilized to maintain performance information concerning each of the individual appliances utilized in the consumer location. Particularly, the operational status of each of the appliances may be monitored by the system of the instant invention through information transmitted from each of the individual appliances over the electrical distribution network to the central control of the system. The system would then record the operational status of each appliance, as well as any other information transmitted therefrom, in a database to allow coordination for, for example, built in test information, failure information, and warranty information.
Additional operational information may be included in the functionality of the individual appliances, encoded with the device ID information of the instant invention, and transmitted over the electric power distribution network in accordance with the teachings of the instant invention. Specifically, the actual power usage as a function of time, average power usage, total amp-hour usage may all be monitored. Furthermore, because the threshold states for on/off/failure as recommended by the manufacturer may be stored by the system, this power monitoring may be used to prompt users to take certain actions, e.g., a high refrigerator current draw may signal the system to prompt the user to clean the refrigerator coils or seek service. The system may also utilize this information to automatically turn off an appliance if the recommended maximum power utilization levels are exceeded. If an appliance is turned off in this manner, it may be reenabled without the requirement of a password (non-secure re-energization) with or without a description of the reason why it turned off.
One of the significant advantages of the individual identification information of the instant invention is that system control functionality accommodated by various electric power distribution network communication protocols such as X-10 and CEBus is may be advantageously used without the need for reprogramming upon physical movement of appliances within a consumer location. As an example, without individual identification of the consumer appliances, the physical movement of a particular appliance from one electrical outlet to another necessitates the reprogramming of the system to recognize the appliance's new physical location. With the system of the instant invention, this is no longer a problem as the individual appliance is addressed by individual ID as opposed to by physical location as with other systems. Therefore, the user is not tied to a particular configuration, but may freely rearrange the physical location of devices within the consumer location without having to repeat a time consuming process of programming the entire centralized control system in response.
Numerous modifications and alternative embodiments of the invention will be apparent to those skilled in the art in view of the foregoing description. Accordingly, this description is to be construed as illustrative only and is for the purpose of teaching those skilled in the art the best mode for carrying out the invention. Details of the structure and implementation of the various components described above can be varied substantially without departing from the spirit of the invention, and exclusive use of all modifications that come within the scope of the appended claims is reserved.

Claims (12)

What is claimed is:
1. A method for deterring theft of manufactured articles, comprising the steps of:
programming a unique electronic universal product protection code (UPPC) into each manufactured article;
associating the UPPC with a password in an external computer system;
transmitting the password via radio frequency to each manufactured article;
disabling operation of each manufactured article in response to receipt of the password;
receiving UPPC information from a user for a particular article;
recalling from the external computer system the password associated with the UPPC information for the particular manufactured article; and
transmitting the password to the user to enable operation of the particular manufactured article.
2. A method for deterring theft of manufactured articles, comprising the steps of:
programming a unique electronic universal product protection code (UPPC) into each manufactured article;
electronically interrogating al least one manufactured article for the UPPC information programmed herein prior to transport of the manufactured article;
storing the UPPC information in a computerized shipping system;
generating a password in the computerized shipping system associated with the UPPC information; and
transmitting the password via radio frequency to each manufactured article; and
disabling operation of each manufactured article in response to receipt to the password prior to shipping the manufactured articles.
3. The method of claim 2, further comprising the steps of:
electronically interrogating the at least one manufactured article for the UPPC information programmed therein upon receipt of the at least one manufactured article;
comparing the UPPC information stored in the computerized shipping system with the UPPC information interrogated upon receipt to confirm receipt of the at least one manufactured article transported;
retrieving the password associated with the UPPC information from the computerized shipping system; and
transmitting the password from the computerized shipping system to the at least one manufactured article to enable operation thereof.
4. A method for deterring theft of manufactured articles, comprising the steps of:
programming a unique universal product protection code (UPPC) into each manufactured article;
transmitting a password via radio frequency to each manufactured article;
disabling operation of each manufactured article in response to receipt to the password prior to shipping the manufactured articles;
transmitting the associated UPPC and password information to a central computerized system;
interrogating the manufactured article at a point of purchase to retrieve the programmed UPPC information;
retrieving the password associated with the UPPC for the manufactured article from the central computerized system; and
transmitting the password to the manufactured article at the point of purchase to enable operation thereof.
5. The method of claim 4, further comprising, after the step of transmitting the password to the manufactured article at the point of purchase, the steps of:
energizing the manufactured article;
setting a user defined password for the manufactured article; and
disabling operation of the manufactured article upon loss of energization to the manufactured article.
6. The method of claim 5, further comprising, after the step of disabling operation of the manufactured article upon loss of energization, the steps of:
energizing the manufactured article, the manufactured article remaining in a disabled state;
entering the user defined password for the manufactured article to enable operation thereof.
7. The method of claim 5, further comprising the steps of:
transmitting the user defined password and the associated programmed UPPC to the central computerized system;
storing the user defined password and the UPPC in the central computerized system; and thereafter
transmitting the UPPC to the central computerized system upon energization of the manufactured article;
retrieving the password associated with the UPPC for the manufactured article from the central computerized system; and
transmitting the user defined password to the manufactured article to enable operation thereof.
8. The method of claim 5, further comprising the steps of:
periodically interrogating the manufactured article to determine a presence thereof; and
enunciating the absence of the manufactured article in response to a lack of response to said step of periodically interrogating.
9. A method for deterring theft of manufactured articles, comprising steps of:
programming a unique universal product protection code (UPPC) into each manufactured article;
transmitting a password via frequency to each manufactured article; and
disabling operation of each manufactured article in response to receipt of the password;
periodically interrogating the manufactured article to determine a presence thereof; and
enunciating the absence of the manufactured article in response to a lack of response to said step of periodically interrogating.
10. A system for deterring theft of manufactured articles, comprising:
a unique identification code programmed into each manufactured article;
a password code associated with the unique identification code;
communication circuitry capable of transmitting said password code to the manufactured articles; and
appliance disabling circuitry integrated within the manufactured articles, said appliance disabling circuitry precluding operation of the manufactured articles upon receipt of the password code associated with said unique identification code programmed therein;
wherein said communication circuitry comprises an RFID interrogator and an RFID device; and
wherein said RFID device is integrated within the manufactured articles and operatively coupled to said appliance disabling circuitry.
11. The system of claim 10, further comprising communication interface circuitry interposed between said communication circuitry and said appliance disabling circuitry, and wherein said RFID device removably interfaces with said communication interface circuitry.
12. A manufactured appliance, comprising:
security and control logic circuitry;
data storage memory;
a unique identification code stored in said memory;
communication circuitry capable of receiving a transmitted password;
wherein said transmitted password is thereafter stored in said memory in association with said unique identification code;
wherein said security and control logic disables operation of the manufactured appliance in response to receipt of said transmitted password; and
wherein said communication circuitry is an RFID device operably coupled to said data storage memory and said security and control logic circuitry.
US09/243,726 1998-07-24 1999-02-03 Electronic identification, control, and security system and method for consumer electronics and the like Expired - Fee Related US6317028B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/243,726 US6317028B1 (en) 1998-07-24 1999-02-03 Electronic identification, control, and security system and method for consumer electronics and the like

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/122,599 US6005476A (en) 1998-07-24 1998-07-24 Electronic identification, control, and security system for consumer electronics and the like
US09/243,726 US6317028B1 (en) 1998-07-24 1999-02-03 Electronic identification, control, and security system and method for consumer electronics and the like

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/122,599 Continuation-In-Part US6005476A (en) 1998-07-24 1998-07-24 Electronic identification, control, and security system for consumer electronics and the like

Publications (1)

Publication Number Publication Date
US6317028B1 true US6317028B1 (en) 2001-11-13

Family

ID=22403669

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/122,599 Expired - Fee Related US6005476A (en) 1998-07-24 1998-07-24 Electronic identification, control, and security system for consumer electronics and the like
US09/243,726 Expired - Fee Related US6317028B1 (en) 1998-07-24 1999-02-03 Electronic identification, control, and security system and method for consumer electronics and the like

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/122,599 Expired - Fee Related US6005476A (en) 1998-07-24 1998-07-24 Electronic identification, control, and security system for consumer electronics and the like

Country Status (2)

Country Link
US (2) US6005476A (en)
WO (1) WO2000005820A1 (en)

Cited By (322)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020056745A1 (en) * 2000-06-20 2002-05-16 De La Fuente Claudio Oscar Electronic product identification system for automatic participation and interaction of users on the internet and other electronic or mechanical marketing, diffusion, advertising promotion and/or purchase incentive programs
US20020078363A1 (en) * 2000-03-24 2002-06-20 Hill Richard A. Apparatus and method for gathering and utilizing data
US20020093426A1 (en) * 1995-10-11 2002-07-18 Jackson Miles R. Enabling/enhancing a feature of an electronic device using radio frequency identification technology
US20020140571A1 (en) * 2001-01-29 2002-10-03 Hayes Patrick H. System and method for using a hand held device to display product information
US20020149468A1 (en) * 2001-04-11 2002-10-17 Carrender Curtis Lee System and method for controlling remote devices
US20020169914A1 (en) * 2001-05-09 2002-11-14 Shteyn Yevgeniy Eugene Device identification and control in network environment
US20020194500A1 (en) * 2001-06-19 2002-12-19 Bajikar Sundeep M. Bluetooth based security system
US20030014646A1 (en) * 2001-07-05 2003-01-16 Buddhikot Milind M. Scheme for authentication and dynamic key exchange
US20030030542A1 (en) * 2001-08-10 2003-02-13 Von Hoffmann Gerard PDA security system
US20030051140A1 (en) * 2001-09-13 2003-03-13 Buddhikot Milind M. Scheme for authentication and dynamic key exchange
US20030052161A1 (en) * 2001-09-18 2003-03-20 Rakers Patrick L. Method of communication in a radio frequency identification system
US20030104848A1 (en) * 2001-11-30 2003-06-05 Raj Brideglall RFID device, system and method of operation including a hybrid backscatter-based RFID tag protocol compatible with RFID, bluetooth and/or IEEE 802.11x infrastructure
US20030132854A1 (en) * 2002-01-11 2003-07-17 Swan Richard J. Item tracking system architectures providing real-time visibility to supply chain
US20030171984A1 (en) * 2002-03-06 2003-09-11 Wodka Joseph F. Customization of promotional material through use of programmable radio frequency identification technology
US6647497B1 (en) * 1999-03-31 2003-11-11 International Business Machines Corporation Method and system for secure computer system transfer
WO2003094105A1 (en) * 2002-04-30 2003-11-13 Koninklijke Philips Electronics N.V. Method of securing a deactivation of a rfid transponder
WO2003094382A1 (en) * 2002-04-30 2003-11-13 Dunotech Plc Adapter for communicating over power line
US20030236872A1 (en) * 2002-05-09 2003-12-25 Kestrel Wireless. Inc. Method and system for enabling electronic transactions via a personal device
US20040048579A1 (en) * 2002-09-05 2004-03-11 Honeywell International Inc. RFID tag and communication protocol for long range tag communications and power efficiency
US20040046644A1 (en) * 2002-09-05 2004-03-11 Honeywell International Inc. Efficient protocol for reading RFID tags
US20040046643A1 (en) * 2002-09-05 2004-03-11 Honeywell International Inc. Method and device for storing and distributing information in an RFID tag
US20040046642A1 (en) * 2002-09-05 2004-03-11 Honeywell International Inc. Protocol for addressing groups of RFID tags
US20040066278A1 (en) * 2002-10-04 2004-04-08 Hughes Michael A. Challenged-based tag authentication medel
US20040066274A1 (en) * 2002-10-07 2004-04-08 Doug Bailey Tamper detection and secure power failure recovery circuit
US20040077341A1 (en) * 2002-10-17 2004-04-22 Chandranmenon Girish P. Multi-interface mobility client
US20040074976A1 (en) * 2002-09-05 2004-04-22 Becker Robert C. RFID tag having multiple transceivers
US20040087304A1 (en) * 2002-10-21 2004-05-06 Buddhikot Milind M. Integrated web cache
US20040100903A1 (en) * 2002-11-25 2004-05-27 Seung-Jae Han Quality of service mechanisms for mobility access device
US20040133704A1 (en) * 2003-01-07 2004-07-08 Openpeak Inc. Legacy device bridge for residential or non-residential networks
US20040150521A1 (en) * 2003-02-03 2004-08-05 Stilp Louis A. RFID based security system
US6774782B2 (en) * 2001-04-27 2004-08-10 Battelle Memorial Institute Radio frequency personnel alerting security system and method
US20040163073A1 (en) * 2002-06-27 2004-08-19 Openpeak Inc. Method, system, and computer program product for automatically managing components within a controlled environment
US20040160324A1 (en) * 2003-02-03 2004-08-19 Stilp Louis A. Controller for a security system
US20040172260A1 (en) * 1996-10-02 2004-09-02 Junger Peter J. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US6792323B2 (en) 2002-06-27 2004-09-14 Openpeak Inc. Method, system, and computer program product for managing controlled residential or non-residential environments
US20040212503A1 (en) * 2003-02-03 2004-10-28 Stilp Louis A. Communications architecture for a security network
US20040215750A1 (en) * 2003-04-28 2004-10-28 Stilp Louis A. Configuration program for a security system
ES2220202A1 (en) * 2002-12-31 2004-12-01 Fernando Mendez Rebollo Burglar alarm system for apparatus connected to domestic mains, has subsystems installed in apparatus required to be protected, and slaves for sharing connection to domestic mains with apparatus
US20040246097A1 (en) * 2003-06-05 2004-12-09 Queenan Joseph A. Secure electronic compartment identifier system
US20050012616A1 (en) * 2003-07-07 2005-01-20 Forster Ian J. RFID device with changeable characteristics
US20050061875A1 (en) * 2003-09-10 2005-03-24 Zai Li-Cheng Richard Method and apparatus for a secure RFID system
US20050097478A1 (en) * 2003-11-03 2005-05-05 Openpeak Inc. User interface for multi-device control
US20050102529A1 (en) * 2002-10-21 2005-05-12 Buddhikot Milind M. Mobility access gateway
US20050128048A1 (en) * 2003-03-14 2005-06-16 Openpeak Inc. Method, system, and computer program product for setup of multi-device control
US6933848B1 (en) * 2001-05-31 2005-08-23 Alien Technology Corporation System and method for disabling data on radio frequency identification tags
US20050184856A1 (en) * 2004-02-19 2005-08-25 Pourchot Shawn C. Electric, telephone or network access control system and method
US20050205673A1 (en) * 2004-03-19 2005-09-22 Applera Corporation Methods and systems for using RFID in biological field
US20050217887A1 (en) * 2002-09-09 2005-10-06 Rose Frank P Universal junction box
US20050231849A1 (en) * 2004-04-15 2005-10-20 Viresh Rustagi Graphical user interface for hard disk drive management in a data storage system
US20050235063A1 (en) * 2004-04-15 2005-10-20 Wilson Christopher S Automatic discovery of a networked device
US20050235128A1 (en) * 2004-04-15 2005-10-20 Viresh Rustagi Automatic expansion of hard disk drive capacity in a storage device
US20050235336A1 (en) * 2004-04-15 2005-10-20 Kenneth Ma Data storage system and method that supports personal video recorder functionality
US20050235283A1 (en) * 2004-04-15 2005-10-20 Wilson Christopher S Automatic setup of parameters in networked devices
US20050242196A1 (en) * 2001-05-31 2005-11-03 Alien Technology Corp. Integrated circuits with persistent data storage
US20050256983A1 (en) * 2004-05-12 2005-11-17 Kenneth Ma System and method to control access to data stored in a data storage device
US20050257013A1 (en) * 2004-05-11 2005-11-17 Kenneth Ma Storage access prioritization using a data storage device
US20050256903A1 (en) * 2002-06-24 2005-11-17 Van De Sluis Bartel M Managing a home network
US6967577B2 (en) 2003-08-11 2005-11-22 Accenture Global Services Gmbh Manufactured article recovery system
US20050262322A1 (en) * 2004-05-21 2005-11-24 Kenneth Ma System and method of replacing a data storage drive
US20060001544A1 (en) * 2004-06-30 2006-01-05 Wolfram Siefke Monitoring and alarm system
US20060011526A1 (en) * 2004-07-15 2006-01-19 Baarman David W Remotely controllable outlet for water treatment system
US20060012489A1 (en) * 2004-07-07 2006-01-19 Hitachi, Ltd. Appliance control apparatus and electrical appliance
US20060017570A1 (en) * 2004-07-26 2006-01-26 Moskowitz Paul A Enabling and disabling a wireless RFID portable transponder
US20060044206A1 (en) * 2004-08-27 2006-03-02 Moskowitz Paul A Shielding wireless transponders
US20060054705A1 (en) * 2004-09-08 2006-03-16 Georgia-Pacific Corporation Package insert with integrated radio frequency transponder
US20060061475A1 (en) * 2004-09-22 2006-03-23 International Business Machines Corporation System and method for disabling RFID tags
US7019639B2 (en) 2003-02-03 2006-03-28 Ingrid, Inc. RFID based security network
US7023341B2 (en) 2003-02-03 2006-04-04 Ingrid, Inc. RFID reader for a security network
US20060095385A1 (en) * 2004-10-26 2006-05-04 Paul Atkinson Method and network for selectively controlling the utility a target
US20060108421A1 (en) * 2003-12-03 2006-05-25 Becker Robert C RFID tag having multiple transceivers
WO2006056911A2 (en) 2004-11-23 2006-06-01 Koninklijke Philips Electronics N.V. Method and apparatus for transferring a data carrier of a first system to a second system
US7057512B2 (en) * 2003-02-03 2006-06-06 Ingrid, Inc. RFID reader for a security system
US20060119487A1 (en) * 2004-12-07 2006-06-08 Paul Atkinson Device and method for selectively activating a target
US20060123570A1 (en) * 2002-12-18 2006-06-15 Pace John W System for enabling limited time trial products
US7072722B1 (en) * 2000-11-21 2006-07-04 Abb T&D Technology Ltd Digital protection and control device and method thereof
US20060149871A1 (en) * 2002-10-15 2006-07-06 Koninklijke Philips Electronics N.V. Wireless security beacon for consumer equipment
US20060190273A1 (en) * 2005-02-23 2006-08-24 International Business Machines Corporation Method, system, and storage medium for implementing transaction-based data exchange
US20060192653A1 (en) * 2005-02-18 2006-08-31 Paul Atkinson Device and method for selectively controlling the utility of an integrated circuit device
US20060230136A1 (en) * 2005-04-12 2006-10-12 Kenneth Ma Intelligent auto-archiving
US7123151B2 (en) * 1998-08-14 2006-10-17 3M Innovative Properties Company Applications for radio frequency identification systems
US20060254815A1 (en) * 2005-04-26 2006-11-16 Humphrey Thomas W Radiofrequency identification shielding
US20060265755A1 (en) * 2005-05-18 2006-11-23 Ta-Wei Liu Method And Related Apparatus For Enhancing Information Security Of A Computer System
US20060273182A1 (en) * 2005-05-31 2006-12-07 Shusuke Iwata Semiconductor device
US20070007358A1 (en) * 2005-07-06 2007-01-11 White Charles A Device and System for Authenticating and Securing Transactions Using RF Communication
US20070008169A1 (en) * 2005-07-11 2007-01-11 Conero Ronald S A Radio Frequency Activated Integrated Circuit and Method of Disabling the Same
US20070021109A1 (en) * 2005-07-21 2007-01-25 Zellner Samuel N Remote disabling of an article of manufacture
US20070018843A1 (en) * 1999-04-22 2007-01-25 Cullum Devon D Anti-theft system and apparatus and method for selectively disabling/enabling electrical apparatus
US7173528B1 (en) 2001-05-31 2007-02-06 Alien Technology Corporation System and method for disabling data on radio frequency identification tags
US20070044091A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. RFID edge server with in process JAVA connector to connect to legacy systems
US20070044093A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. Event boxcarring of RFID information sent from RFID edge server
US20070044092A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. RFID edge server with socket multiplexing
US20070044089A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. Packaging of RFID software at edge server
US20070044090A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. Packaging of EPCIS software
US20070044095A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. RFID edge server with security plug-ins
US20070043422A1 (en) * 2005-08-18 2007-02-22 Cappella, Inc. Delivery system and method of use for accurate positioning of a device in a bifurcation
US20070043827A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. RFID edge server with security WSRM
US20070044094A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. JMX administration of RFID edge server
US20070043834A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. Store and forward messaging from RFID edge server
US20070109129A1 (en) * 2005-05-24 2007-05-17 Sundstrom Kurt E Rfid reader systems detecting pilot tone
US20070136585A1 (en) * 2005-12-12 2007-06-14 Impinj, Inc. Determining authentication of RFID tags for indicating legitimacy of their associated items
US20070136584A1 (en) * 2005-12-12 2007-06-14 Impinj, Inc. Handling legitimate and unauthorized items in supply chain according to authentication of their RFID tags
US20070185981A1 (en) * 2006-02-09 2007-08-09 Matsushita Electric Industrial Co., Ltd. Power line communication apparatus and power line communication system
US20070208864A1 (en) * 2002-10-21 2007-09-06 Flynn Lori A Mobility access gateway
US20070223692A1 (en) * 2005-10-18 2007-09-27 Paul Atkinson Activation confirmation feedback circuits and methods
US20070223014A1 (en) * 2004-04-20 2007-09-27 Johannes Lenkl Thermotransfer Printer With Single Sheet Intake Means
US7298264B1 (en) 2004-01-20 2007-11-20 Charles A. Eldering RFID tag filtering and monitoring
US20070296552A1 (en) * 1998-07-23 2007-12-27 Universal Electronics Inc. System and method for setting up a universal remote control
US7316352B1 (en) 2004-12-23 2008-01-08 Storage Technology Corporation System and method for locked code on a radio frequency identification tag
US20080028420A1 (en) * 2006-01-20 2008-01-31 Paul Atkinson Optical Media with Reduced Areal-Sized Optical shutters
US20080048833A1 (en) * 2006-01-12 2008-02-28 Oliver Ronald A Rfid reader system aided by rf power of measurement
US20080071627A1 (en) * 1998-11-13 2008-03-20 Nintendo Of America Inc. Method and apparatus for verifying product sale transactions and processing product returns
US7348887B1 (en) * 2004-06-15 2008-03-25 Eigent Technologies, Llc RFIDs embedded into semiconductors
US20080093463A1 (en) * 2006-10-18 2008-04-24 Wei Chang Rfid tags, rfid electronic devices and related methods for anti-theft and data transmission purposes
US20080106385A1 (en) * 2006-10-11 2008-05-08 International Business Machines Corporation Method and system for protecting rfid tags on purchased goods
US7377445B1 (en) 2001-05-31 2008-05-27 Alien Technology Corporation Integrated circuits with persistent data storage
US7382258B2 (en) 2004-03-19 2008-06-03 Applera Corporation Sample carrier device incorporating radio frequency identification, and method
US20080129451A1 (en) * 2006-11-30 2008-06-05 Smires Daniel T Apparatus and method for automated inventory tracking and authentication
US20080136603A1 (en) * 2006-12-08 2008-06-12 Electronics And Telecommunications Research Institute Low-powered rfid tag and method of expanding lifecycle of rfid tag
US20080164975A1 (en) * 2005-12-09 2008-07-10 Butler Timothy P Multiple radio frequency network node rfid tag
US20080180301A1 (en) * 2007-01-29 2008-07-31 Aaron Jeffrey A Methods, systems, and products for controlling devices
US20080186139A1 (en) * 2005-12-09 2008-08-07 Butler Timothy P Methods and systems of a multiple radio frequency network node rfid tag
US20080186137A1 (en) * 2005-12-09 2008-08-07 Butler Timothy P Methods and systems of a multiple radio frequency network node rfid tag
US7420458B1 (en) 2004-01-20 2008-09-02 Charles A. Eldering Secondary card reader
US20080218354A1 (en) * 2007-03-09 2008-09-11 Lorentz Robert D Non-networked rfid system
US20080233341A1 (en) * 2005-08-26 2008-09-25 Evonik Degussa Gmbh Special Aminoalkylsilane Compounds as Binders for Composite Materials
US20080238627A1 (en) * 2005-03-22 2008-10-02 Applera Corporation Sample carrier device incorporating radio frequency identification, and method
US20080250510A1 (en) * 2007-04-05 2008-10-09 Jon Stevens Distribution channel loss protection for electronic devices
US20080252459A1 (en) * 2005-12-09 2008-10-16 Butler Timothy P Methods and systems of a multiple radio frequency network node rfid tag
US20080273684A1 (en) * 2007-05-04 2008-11-06 3V Technologies Incorporated Systems and Methods for RFID-Based Access Management of Electronic Devices
US7453852B2 (en) 2003-07-14 2008-11-18 Lucent Technologies Inc. Method and system for mobility across heterogeneous address spaces
US20080288178A1 (en) * 2001-08-24 2008-11-20 Applera Corporation Sequencing system with memory
US7455230B2 (en) 2005-04-22 2008-11-25 Nintendo Of America Inc. UPC, EAN and JAN validation system and method for loss prevention at point of sale/return
US20080307474A1 (en) * 2007-06-07 2008-12-11 Broadcom Corporation Connectivity for consumer electronics products
US20090033498A1 (en) * 2003-06-30 2009-02-05 Heikki Huomo System and Method for Supporting Multiple Reader-Tag Configurations Using Multi-Mode Radio Frequency Tag
US20090098829A1 (en) * 2006-04-26 2009-04-16 Power Secure Development Aps System for securing electrical apparatus
US7580860B2 (en) 1996-10-02 2009-08-25 Nintendo Of America Inc. Method and apparatus for efficient handling of product return transactions
US20090289776A1 (en) * 2006-12-11 2009-11-26 Larry Moore Composite multiple rfid tag facility
US20100118149A1 (en) * 2008-11-10 2010-05-13 Eduard Levin System and method for tracking and monitoring personnel and equipment
US7729923B2 (en) 2000-10-10 2010-06-01 Nintendo Of America, Inc. Voice recognition and apparatus using model number lookup
US20100187306A1 (en) * 2005-08-01 2010-07-29 Worthwhile Products Inventory control system
US20100289627A1 (en) * 2005-08-19 2010-11-18 Adasa Inc. Fully Secure Item-Level Tagging
US7840439B2 (en) 2003-11-10 2010-11-23 Nintendo Of America, Inc. RF-ID product tracking system with privacy enhancement
US20100307921A1 (en) * 2001-09-19 2010-12-09 Life Technologies Corporation Microdevice with integrated memory
US20100309878A1 (en) * 2009-06-08 2010-12-09 Aleksandr Stolyar Mobility access gateway
US20110018689A1 (en) * 2005-08-19 2011-01-27 Adasa Inc. Secure modular applicators to commision wireless sensors
US20110068924A1 (en) * 2000-01-24 2011-03-24 Nextreme, Llc Pallet with pallet RFID reader/writer for conducting on-demand pallet inventory
US7933945B2 (en) 2002-06-27 2011-04-26 Openpeak Inc. Method, system, and computer program product for managing controlled residential or non-residential environments
US20110153441A1 (en) * 2009-12-23 2011-06-23 Merrill Brooks Smith Systems and Methods for Authorizing Use of Validly Sold Merchandise
US8006902B2 (en) 1998-08-14 2011-08-30 3M Innovative Properties Company Radio frequency identification systems applications
US8108316B1 (en) * 2007-12-20 2012-01-31 Symantec Corporation Systems, apparatus, and methods for online purchasing
US8116889B2 (en) 2002-06-27 2012-02-14 Openpeak Inc. Method, system, and computer program product for managing controlled residential or non-residential environments
US8156026B2 (en) 2000-05-12 2012-04-10 Nintendo of America Ltd. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US8204787B2 (en) 1996-10-02 2012-06-19 Nintendo Of America Inc. Electronic registration system for product transactions
US8209226B2 (en) 2001-11-15 2012-06-26 Nintendo Of America Inc. Non-serialized electronic product registration system and method of operating same
US8239269B2 (en) 2009-09-11 2012-08-07 Nintendo Of America Inc. System and/or method for handling returns involving products tied to post-paid subscriptions/services
US20120214476A1 (en) * 2001-08-02 2012-08-23 Sony Corporation Remote control system and remote control method, device for performing remote control operation and control method therefor, device operable by remote control operation and control method therefor, and storage medium
US8269630B2 (en) 2005-12-09 2012-09-18 Tego Inc. Methods and systems of a multiple radio frequency network node RFID tag
US8302024B2 (en) 2009-04-02 2012-10-30 Nintendo Of America Inc. Systems and/or methods for paging control including selective paging element display according to a binary subdivision and/or a serial progressive display approach
US8390456B2 (en) 2008-12-03 2013-03-05 Tego Inc. RFID tag facility with access to external devices
US8510171B2 (en) 2000-07-25 2013-08-13 Nintendo Of America Inc. Electronic product registration system with customizable return/warranty programs
US8538801B2 (en) 1999-02-19 2013-09-17 Exxonmobile Research & Engineering Company System and method for processing financial transactions
US8595062B2 (en) 2010-11-15 2013-11-26 Nintendo Of America Inc. Systems and/or methods for fraud detection in award point programs
US20140025221A1 (en) * 2007-03-14 2014-01-23 Zonit Structured Solutions, Llc Smart electrical outlets and associated networks
RU2517372C2 (en) * 2009-10-15 2014-05-27 ЗетТиИ Корпорейшн Multi-frequency label and method and system for dynamic adjustment of radiofrequency parameters of multi-frequency label
US8788432B2 (en) 1996-10-02 2014-07-22 Nintendo Of America Inc. Method and apparatus for efficient handling of product return transactions
US20150066227A1 (en) * 2011-05-16 2015-03-05 Zonit Structured Solutions, Llc Communications protocol for intelligent outlets
US8988223B2 (en) 2005-12-09 2015-03-24 Tego Inc. RFID drive management facility
US9117128B2 (en) 2005-12-09 2015-08-25 Tego, Inc. External access to memory on an RFID tag
US9197636B2 (en) 2011-07-12 2015-11-24 At&T Intellectual Property I, L.P. Devices, systems and methods for security using magnetic field based identification
US9361568B2 (en) 2005-12-09 2016-06-07 Tego, Inc. Radio frequency identification tag with hardened memory system
US9418263B2 (en) 2005-12-09 2016-08-16 Tego, Inc. Operating systems for an RFID tag
US9430732B2 (en) 2014-05-08 2016-08-30 Tego, Inc. Three-dimension RFID tag with opening through structure
US9542577B2 (en) 2005-12-09 2017-01-10 Tego, Inc. Information RFID tagging facilities
US9633347B2 (en) 2012-05-04 2017-04-25 e2interactive. Inc Systems and/or methods for selling non-inventory items at point-of-sale (POS) locations
US9674711B2 (en) 2013-11-06 2017-06-06 At&T Intellectual Property I, L.P. Surface-wave communications and methods thereof
US9672711B2 (en) 2011-01-07 2017-06-06 Southern Imperial, Inc. System and method for integrated product protection
US9685992B2 (en) 2014-10-03 2017-06-20 At&T Intellectual Property I, L.P. Circuit panel network and methods thereof
US9705561B2 (en) 2015-04-24 2017-07-11 At&T Intellectual Property I, L.P. Directional coupling device and methods for use therewith
US9705610B2 (en) 2014-10-21 2017-07-11 At&T Intellectual Property I, L.P. Transmission device with impairment compensation and methods for use therewith
US20170200025A1 (en) * 2016-01-11 2017-07-13 Adt Us Holdings, Inc. Securing electronic property from unauthorized use
US9729197B2 (en) 2015-10-01 2017-08-08 At&T Intellectual Property I, L.P. Method and apparatus for communicating network management traffic over a network
US9735833B2 (en) 2015-07-31 2017-08-15 At&T Intellectual Property I, L.P. Method and apparatus for communications management in a neighborhood network
US9742521B2 (en) 2014-11-20 2017-08-22 At&T Intellectual Property I, L.P. Transmission device with mode division multiplexing and methods for use therewith
US9742462B2 (en) 2014-12-04 2017-08-22 At&T Intellectual Property I, L.P. Transmission medium and communication interfaces and methods for use therewith
US9748626B2 (en) 2015-05-14 2017-08-29 At&T Intellectual Property I, L.P. Plurality of cables having different cross-sectional shapes which are bundled together to form a transmission medium
US9749013B2 (en) 2015-03-17 2017-08-29 At&T Intellectual Property I, L.P. Method and apparatus for reducing attenuation of electromagnetic waves guided by a transmission medium
US9749053B2 (en) 2015-07-23 2017-08-29 At&T Intellectual Property I, L.P. Node device, repeater and methods for use therewith
US9769020B2 (en) 2014-10-21 2017-09-19 At&T Intellectual Property I, L.P. Method and apparatus for responding to events affecting communications in a communication network
US9768833B2 (en) 2014-09-15 2017-09-19 At&T Intellectual Property I, L.P. Method and apparatus for sensing a condition in a transmission medium of electromagnetic waves
US9769128B2 (en) 2015-09-28 2017-09-19 At&T Intellectual Property I, L.P. Method and apparatus for encryption of communications over a network
US9780834B2 (en) 2014-10-21 2017-10-03 At&T Intellectual Property I, L.P. Method and apparatus for transmitting electromagnetic waves
US9787412B2 (en) 2015-06-25 2017-10-10 At&T Intellectual Property I, L.P. Methods and apparatus for inducing a fundamental wave mode on a transmission medium
US9793955B2 (en) 2015-04-24 2017-10-17 At&T Intellectual Property I, Lp Passive electrical coupling device and methods for use therewith
US9793954B2 (en) 2015-04-28 2017-10-17 At&T Intellectual Property I, L.P. Magnetic coupling device and methods for use therewith
US9800327B2 (en) 2014-11-20 2017-10-24 At&T Intellectual Property I, L.P. Apparatus for controlling operations of a communication device and methods thereof
US9820146B2 (en) 2015-06-12 2017-11-14 At&T Intellectual Property I, L.P. Method and apparatus for authentication and identity management of communicating devices
US9838078B2 (en) 2015-07-31 2017-12-05 At&T Intellectual Property I, L.P. Method and apparatus for exchanging communication signals
US9838896B1 (en) 2016-12-09 2017-12-05 At&T Intellectual Property I, L.P. Method and apparatus for assessing network coverage
US9846871B2 (en) 2010-04-12 2017-12-19 E2Interactive, Inc. Systems and/or methods for determining item serial number structure and intelligence
US9847566B2 (en) 2015-07-14 2017-12-19 At&T Intellectual Property I, L.P. Method and apparatus for adjusting a field of a signal to mitigate interference
US9847850B2 (en) 2014-10-14 2017-12-19 At&T Intellectual Property I, L.P. Method and apparatus for adjusting a mode of communication in a communication network
US9853342B2 (en) 2015-07-14 2017-12-26 At&T Intellectual Property I, L.P. Dielectric transmission medium connector and methods for use therewith
US9860075B1 (en) 2016-08-26 2018-01-02 At&T Intellectual Property I, L.P. Method and communication node for broadband distribution
US9865911B2 (en) 2015-06-25 2018-01-09 At&T Intellectual Property I, L.P. Waveguide system for slot radiating first electromagnetic waves that are combined into a non-fundamental wave mode second electromagnetic wave on a transmission medium
US9866276B2 (en) 2014-10-10 2018-01-09 At&T Intellectual Property I, L.P. Method and apparatus for arranging communication sessions in a communication system
US9866309B2 (en) 2015-06-03 2018-01-09 At&T Intellectual Property I, Lp Host node device and methods for use therewith
US9871558B2 (en) 2014-10-21 2018-01-16 At&T Intellectual Property I, L.P. Guided-wave transmission device and methods for use therewith
US9871282B2 (en) 2015-05-14 2018-01-16 At&T Intellectual Property I, L.P. At least one transmission medium having a dielectric surface that is covered at least in part by a second dielectric
US9871283B2 (en) 2015-07-23 2018-01-16 At&T Intellectual Property I, Lp Transmission medium having a dielectric core comprised of plural members connected by a ball and socket configuration
US9876570B2 (en) 2015-02-20 2018-01-23 At&T Intellectual Property I, Lp Guided-wave transmission device with non-fundamental mode propagation and methods for use therewith
US9876264B2 (en) 2015-10-02 2018-01-23 At&T Intellectual Property I, Lp Communication system, guided wave switch and methods for use therewith
US9882257B2 (en) 2015-07-14 2018-01-30 At&T Intellectual Property I, L.P. Method and apparatus for launching a wave mode that mitigates interference
US9887447B2 (en) 2015-05-14 2018-02-06 At&T Intellectual Property I, L.P. Transmission medium having multiple cores and methods for use therewith
US9893795B1 (en) 2016-12-07 2018-02-13 At&T Intellectual Property I, Lp Method and repeater for broadband distribution
US9904535B2 (en) 2015-09-14 2018-02-27 At&T Intellectual Property I, L.P. Method and apparatus for distributing software
US9906269B2 (en) 2014-09-17 2018-02-27 At&T Intellectual Property I, L.P. Monitoring and mitigating conditions in a communication network
US9911020B1 (en) 2016-12-08 2018-03-06 At&T Intellectual Property I, L.P. Method and apparatus for tracking via a radio frequency identification device
US9912382B2 (en) 2015-06-03 2018-03-06 At&T Intellectual Property I, Lp Network termination and methods for use therewith
US9913139B2 (en) 2015-06-09 2018-03-06 At&T Intellectual Property I, L.P. Signal fingerprinting for authentication of communicating devices
US9912027B2 (en) 2015-07-23 2018-03-06 At&T Intellectual Property I, L.P. Method and apparatus for exchanging communication signals
US9912033B2 (en) 2014-10-21 2018-03-06 At&T Intellectual Property I, Lp Guided wave coupler, coupling module and methods for use therewith
US9917341B2 (en) 2015-05-27 2018-03-13 At&T Intellectual Property I, L.P. Apparatus and method for launching electromagnetic waves and for modifying radial dimensions of the propagating electromagnetic waves
US9927517B1 (en) 2016-12-06 2018-03-27 At&T Intellectual Property I, L.P. Apparatus and methods for sensing rainfall
US9929755B2 (en) 2015-07-14 2018-03-27 At&T Intellectual Property I, L.P. Method and apparatus for coupling an antenna to a device
US9948333B2 (en) 2015-07-23 2018-04-17 At&T Intellectual Property I, L.P. Method and apparatus for wireless communications to mitigate interference
US9954286B2 (en) 2014-10-21 2018-04-24 At&T Intellectual Property I, L.P. Guided-wave transmission device with non-fundamental mode propagation and methods for use therewith
US9954287B2 (en) 2014-11-20 2018-04-24 At&T Intellectual Property I, L.P. Apparatus for converting wireless signals and electromagnetic waves and methods thereof
US9953193B2 (en) 2014-09-30 2018-04-24 Tego, Inc. Operating systems for an RFID tag
US9967173B2 (en) 2015-07-31 2018-05-08 At&T Intellectual Property I, L.P. Method and apparatus for authentication and identity management of communicating devices
US9973940B1 (en) 2017-02-27 2018-05-15 At&T Intellectual Property I, L.P. Apparatus and methods for dynamic impedance matching of a guided wave launcher
US9973416B2 (en) 2014-10-02 2018-05-15 At&T Intellectual Property I, L.P. Method and apparatus that provides fault tolerance in a communication network
US9997819B2 (en) 2015-06-09 2018-06-12 At&T Intellectual Property I, L.P. Transmission medium and method for facilitating propagation of electromagnetic waves via a core
US9998870B1 (en) 2016-12-08 2018-06-12 At&T Intellectual Property I, L.P. Method and apparatus for proximity sensing
US9999038B2 (en) 2013-05-31 2018-06-12 At&T Intellectual Property I, L.P. Remote distributed antenna system
US10009067B2 (en) 2014-12-04 2018-06-26 At&T Intellectual Property I, L.P. Method and apparatus for configuring a communication interface
US10020844B2 (en) 2016-12-06 2018-07-10 T&T Intellectual Property I, L.P. Method and apparatus for broadcast communication via guided waves
US10027397B2 (en) 2016-12-07 2018-07-17 At&T Intellectual Property I, L.P. Distributed antenna system and methods for use therewith
US10044409B2 (en) 2015-07-14 2018-08-07 At&T Intellectual Property I, L.P. Transmission medium and methods for use therewith
US10051630B2 (en) 2013-05-31 2018-08-14 At&T Intellectual Property I, L.P. Remote distributed antenna system
US10069185B2 (en) 2015-06-25 2018-09-04 At&T Intellectual Property I, L.P. Methods and apparatus for inducing a non-fundamental wave mode on a transmission medium
US10069535B2 (en) 2016-12-08 2018-09-04 At&T Intellectual Property I, L.P. Apparatus and methods for launching electromagnetic waves having a certain electric field structure
WO2018160910A1 (en) * 2017-03-02 2018-09-07 Walmart Apollo, Llc In-home product recall notification system and method
US10090594B2 (en) 2016-11-23 2018-10-02 At&T Intellectual Property I, L.P. Antenna system having structural configurations for assembly
US10090606B2 (en) 2015-07-15 2018-10-02 At&T Intellectual Property I, L.P. Antenna system with dielectric array and methods for use therewith
US10103422B2 (en) 2016-12-08 2018-10-16 At&T Intellectual Property I, L.P. Method and apparatus for mounting network devices
US10135145B2 (en) 2016-12-06 2018-11-20 At&T Intellectual Property I, L.P. Apparatus and methods for generating an electromagnetic wave along a transmission medium
US10139820B2 (en) 2016-12-07 2018-11-27 At&T Intellectual Property I, L.P. Method and apparatus for deploying equipment of a communication system
US10148016B2 (en) 2015-07-14 2018-12-04 At&T Intellectual Property I, L.P. Apparatus and methods for communicating utilizing an antenna array
US10152614B2 (en) 2003-11-14 2018-12-11 E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US10168695B2 (en) 2016-12-07 2019-01-01 At&T Intellectual Property I, L.P. Method and apparatus for controlling an unmanned aircraft
US10178445B2 (en) 2016-11-23 2019-01-08 At&T Intellectual Property I, L.P. Methods, devices, and systems for load balancing between a plurality of waveguides
US10205655B2 (en) 2015-07-14 2019-02-12 At&T Intellectual Property I, L.P. Apparatus and methods for communicating utilizing an antenna array and multiple communication paths
US10225025B2 (en) 2016-11-03 2019-03-05 At&T Intellectual Property I, L.P. Method and apparatus for detecting a fault in a communication system
US10224634B2 (en) 2016-11-03 2019-03-05 At&T Intellectual Property I, L.P. Methods and apparatus for adjusting an operational characteristic of an antenna
US10243270B2 (en) 2016-12-07 2019-03-26 At&T Intellectual Property I, L.P. Beam adaptive multi-feed dielectric antenna system and methods for use therewith
US10243784B2 (en) 2014-11-20 2019-03-26 At&T Intellectual Property I, L.P. System for generating topology information and methods thereof
US10264586B2 (en) 2016-12-09 2019-04-16 At&T Mobility Ii Llc Cloud-based packet controller and methods for use therewith
US20190129497A1 (en) * 2017-10-27 2019-05-02 EMC IP Holding Company LLC Method and system for binding chassis and components
US10291334B2 (en) 2016-11-03 2019-05-14 At&T Intellectual Property I, L.P. System for detecting a fault in a communication system
US10296916B2 (en) 2009-09-11 2019-05-21 Maridee Joy Maraz System and/or method for handling recalled product purchases and/or return/warranty requests
US10298293B2 (en) 2017-03-13 2019-05-21 At&T Intellectual Property I, L.P. Apparatus of communication utilizing wireless network devices
US10305190B2 (en) 2016-12-01 2019-05-28 At&T Intellectual Property I, L.P. Reflecting dielectric antenna system and methods for use therewith
US10312567B2 (en) 2016-10-26 2019-06-04 At&T Intellectual Property I, L.P. Launcher with planar strip antenna and methods for use therewith
US10326494B2 (en) 2016-12-06 2019-06-18 At&T Intellectual Property I, L.P. Apparatus for measurement de-embedding and methods for use therewith
US10326689B2 (en) 2016-12-08 2019-06-18 At&T Intellectual Property I, L.P. Method and system for providing alternative communication paths
US10340603B2 (en) 2016-11-23 2019-07-02 At&T Intellectual Property I, L.P. Antenna system having shielded structural configurations for assembly
US10340601B2 (en) 2016-11-23 2019-07-02 At&T Intellectual Property I, L.P. Multi-antenna system and methods for use therewith
US10340573B2 (en) 2016-10-26 2019-07-02 At&T Intellectual Property I, L.P. Launcher with cylindrical coupling device and methods for use therewith
US10340983B2 (en) 2016-12-09 2019-07-02 At&T Intellectual Property I, L.P. Method and apparatus for surveying remote sites via guided wave communications
US10355367B2 (en) 2015-10-16 2019-07-16 At&T Intellectual Property I, L.P. Antenna structure for exchanging wireless signals
US10359749B2 (en) 2016-12-07 2019-07-23 At&T Intellectual Property I, L.P. Method and apparatus for utilities management via guided wave communication
US10361489B2 (en) 2016-12-01 2019-07-23 At&T Intellectual Property I, L.P. Dielectric dish antenna system and methods for use therewith
US10374316B2 (en) 2016-10-21 2019-08-06 At&T Intellectual Property I, L.P. System and dielectric antenna with non-uniform dielectric
US10382976B2 (en) 2016-12-06 2019-08-13 At&T Intellectual Property I, L.P. Method and apparatus for managing wireless communications based on communication paths and network device positions
US10389029B2 (en) 2016-12-07 2019-08-20 At&T Intellectual Property I, L.P. Multi-feed dielectric antenna system with core selection and methods for use therewith
US10389037B2 (en) 2016-12-08 2019-08-20 At&T Intellectual Property I, L.P. Apparatus and methods for selecting sections of an antenna array and use therewith
US10411356B2 (en) 2016-12-08 2019-09-10 At&T Intellectual Property I, L.P. Apparatus and methods for selectively targeting communication devices with an antenna array
US10423867B2 (en) 2012-09-17 2019-09-24 E2Interactive, Inc. Composite activation indicia substrate
US10439675B2 (en) 2016-12-06 2019-10-08 At&T Intellectual Property I, L.P. Method and apparatus for repeating guided wave communication signals
US10446936B2 (en) 2016-12-07 2019-10-15 At&T Intellectual Property I, L.P. Multi-feed dielectric antenna system and methods for use therewith
US10498044B2 (en) 2016-11-03 2019-12-03 At&T Intellectual Property I, L.P. Apparatus for configuring a surface of an antenna
US10514907B2 (en) 2018-03-28 2019-12-24 EMC IP Holding Company LLC System and method for out-of-the-box solution-level management via logical architecture awareness
US10530505B2 (en) 2016-12-08 2020-01-07 At&T Intellectual Property I, L.P. Apparatus and methods for launching electromagnetic waves along a transmission medium
US10535928B2 (en) 2016-11-23 2020-01-14 At&T Intellectual Property I, L.P. Antenna system and methods for use therewith
US10547348B2 (en) 2016-12-07 2020-01-28 At&T Intellectual Property I, L.P. Method and apparatus for switching transmission mediums in a communication system
US10601494B2 (en) 2016-12-08 2020-03-24 At&T Intellectual Property I, L.P. Dual-band communication device and method for use therewith
US10637149B2 (en) 2016-12-06 2020-04-28 At&T Intellectual Property I, L.P. Injection molded dielectric antenna and methods for use therewith
US10650940B2 (en) 2015-05-15 2020-05-12 At&T Intellectual Property I, L.P. Transmission medium having a conductive material and methods for use therewith
US10694379B2 (en) 2016-12-06 2020-06-23 At&T Intellectual Property I, L.P. Waveguide system with device-based authentication and methods for use therewith
US10693722B2 (en) 2018-03-28 2020-06-23 Dell Products L.P. Agentless method to bring solution and cluster awareness into infrastructure and support management portals
US10699178B1 (en) * 2017-09-21 2020-06-30 Impinj, Inc. Digital identities for physical items
US10727599B2 (en) 2016-12-06 2020-07-28 At&T Intellectual Property I, L.P. Launcher with slot antenna and methods for use therewith
US10728398B2 (en) 2001-09-24 2020-07-28 E2Interactive, Inc. Inserting value into customer account at point of sale using a customer account identifier
US10755542B2 (en) 2016-12-06 2020-08-25 At&T Intellectual Property I, L.P. Method and apparatus for surveillance via guided wave communication
US10754708B2 (en) 2018-03-28 2020-08-25 EMC IP Holding Company LLC Orchestrator and console agnostic method to deploy infrastructure through self-describing deployment templates
US10777873B2 (en) 2016-12-08 2020-09-15 At&T Intellectual Property I, L.P. Method and apparatus for mounting network devices
US10797781B2 (en) 2015-06-03 2020-10-06 At&T Intellectual Property I, L.P. Client node device and methods for use therewith
US10795756B2 (en) 2018-04-24 2020-10-06 EMC IP Holding Company LLC System and method to predictively service and support the solution
US10811767B2 (en) 2016-10-21 2020-10-20 At&T Intellectual Property I, L.P. System and dielectric antenna with convex dielectric radome
US10819035B2 (en) 2016-12-06 2020-10-27 At&T Intellectual Property I, L.P. Launcher with helical antenna and methods for use therewith
US10862761B2 (en) 2019-04-29 2020-12-08 EMC IP Holding Company LLC System and method for management of distributed systems
US10916969B2 (en) 2016-12-08 2021-02-09 At&T Intellectual Property I, L.P. Method and apparatus for providing power using an inductive coupling
US10938108B2 (en) 2016-12-08 2021-03-02 At&T Intellectual Property I, L.P. Frequency selective multi-feed dielectric antenna system and methods for use therewith
US10937076B2 (en) 2010-10-13 2021-03-02 E2Interactive, Inc. Online personalized gifting system
US10954049B2 (en) 2017-12-12 2021-03-23 E2Interactive, Inc. Viscous liquid vessel for gifting
US11017443B2 (en) 2014-04-30 2021-05-25 E2Interactive, Inc. System and method for a merchant onsite personalization gifting platform
US11055686B2 (en) 2012-08-08 2021-07-06 E2Interactive, Inc. S/M for providing, reloading, and redeeming stored value cards used in transit applications
US11075925B2 (en) 2018-01-31 2021-07-27 EMC IP Holding Company LLC System and method to enable component inventory and compliance in the platform
US11086738B2 (en) 2018-04-24 2021-08-10 EMC IP Holding Company LLC System and method to automate solution level contextual support
US11112416B2 (en) 2018-01-30 2021-09-07 Life Technologies Corporation Instruments, devices and consumables for use in a workflow of a smart molecular analysis system
US11111065B2 (en) 2013-02-15 2021-09-07 E2Interactive, Inc. Gift card presentation devices
US11120428B2 (en) 2013-05-02 2021-09-14 E2Interactive, Inc. Stored value card kiosk system and method
US11120462B2 (en) 2013-11-04 2021-09-14 E2Interactive, Inc. Systems and methods for using indicia of membership as a partial authorization in a transaction
US11182836B2 (en) 2010-10-13 2021-11-23 E2Interactive, Inc. Gift card ordering system and method
US11219288B2 (en) 2013-02-15 2022-01-11 E2Interactive, Inc. Gift card box with slanted tray and slit
US11301557B2 (en) 2019-07-19 2022-04-12 Dell Products L.P. System and method for data processing device management
US11316368B2 (en) 2007-03-14 2022-04-26 Zonit Structured Solutions, Llc Premises power usage monitoring system
US11395142B2 (en) * 2020-01-31 2022-07-19 Lowe's Companies, Inc. System and techniques for secret key transfer in benefit denial system
US11436651B2 (en) 2012-01-30 2022-09-06 E2Interactive, Inc. Group video generating system
US11599422B2 (en) 2018-10-16 2023-03-07 EMC IP Holding Company LLC System and method for device independent backup in distributed system
US11831636B2 (en) 2020-01-31 2023-11-28 Lowe's Companies, Inc. Systems and techniques for trans-account device key transfer in benefit denial system
US11928696B2 (en) 2009-12-16 2024-03-12 E2Interactive, Inc. Systems and methods for generating a virtual value item for a promotional campaign

Families Citing this family (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6480510B1 (en) 1998-07-28 2002-11-12 Serconet Ltd. Local area network of serial intelligent cells
US6970081B1 (en) * 1998-09-17 2005-11-29 Koninklijke Philips Electronics N.V. Distributed software controlled theft detection
US6111504A (en) * 1999-01-12 2000-08-29 Packard; Jeffrey W. Electronic equipment security and recovery system
US7650425B2 (en) * 1999-03-18 2010-01-19 Sipco, Llc System and method for controlling communication between a host computer and communication devices associated with remote devices in an automated monitoring system
US6463495B1 (en) * 1999-03-29 2002-10-08 Compaq Information Technologies Group, L.P. Command and control infrastructure for a computer system using the computer's power rail
JP4371183B2 (en) * 1999-08-04 2009-11-25 株式会社セガ Data communication method in game system
US6665720B1 (en) * 1999-09-21 2003-12-16 Intel Corporation Adapter for a home power line network
US6507273B1 (en) * 1999-10-08 2003-01-14 Digipower Manufacturing Inc. Network-based remotely-controlled power switch device
US6380852B1 (en) * 1999-11-02 2002-04-30 Quietech Llc Power shut-off that operates in response to prespecified remote-conditions
US6731201B1 (en) 2000-02-23 2004-05-04 Robert Shaw Controls Company Communications module and system
US6549616B1 (en) 2000-03-20 2003-04-15 Serconet Ltd. Telephone outlet for implementing a local area network over telephone lines and a local area network using such outlets
US6791467B1 (en) * 2000-03-23 2004-09-14 Flextronics Semiconductor, Inc. Adaptive remote controller
FR2808149B1 (en) * 2000-04-19 2003-01-31 Electricite De France METHOD AND DEVICE FOR ENABLING CONTROL OF AN ELECTRIC APPARATUS CONNECTED TO A NETWORK
US6842459B1 (en) 2000-04-19 2005-01-11 Serconet Ltd. Network combining wired and non-wired segments
US20020078445A1 (en) * 2000-07-11 2002-06-20 Imran Sharif Internet appliance for interactive audio/video display using a remote control unit for user input
US7245291B2 (en) 2000-07-11 2007-07-17 Imran Sharif System and method for internet appliance data entry and navigation
US6980313B2 (en) 2000-07-11 2005-12-27 Imran Sharif Fax-compatible internet appliance
KR20020017920A (en) * 2000-08-31 2002-03-07 이마이 기요스케 Protocol conversion connector for use in a communication network and network system
US7555528B2 (en) 2000-09-06 2009-06-30 Xanboo Inc. Systems and methods for virtually representing devices at remote sites
US6686838B1 (en) 2000-09-06 2004-02-03 Xanboo Inc. Systems and methods for the automatic registration of devices
US7734724B2 (en) * 2000-09-06 2010-06-08 Xanboo Inc. Automated upload of content based on captured event
WO2002028018A2 (en) * 2000-09-26 2002-04-04 The Musicbooth, Llc. Method and apparatus for identifying user characteristics and device characteristics using a communication network
US7099026B1 (en) 2000-10-17 2006-08-29 International Business Machines Corporation Unique printer pass code system and method
US7039391B2 (en) * 2000-11-28 2006-05-02 Xanboo, Inc. Method and system for communicating with a wireless device
JP2002261763A (en) * 2001-02-27 2002-09-13 Brother Ind Ltd Network system, network apparatus, network regulator, and apparatus number setting member
US6703923B2 (en) * 2001-04-18 2004-03-09 Thomson Licensing S.A. Apparatus for providing security on a powerline-modem network
US7194513B2 (en) 2001-07-08 2007-03-20 Imran Sharif System and method for using an internet appliance to send/receive digital content files as E-mail attachments
US6759946B2 (en) * 2001-12-06 2004-07-06 Mitsubishi Electric Research Laboratories, Inc. Home appliances network
DE60208325T2 (en) * 2002-01-21 2006-08-03 Hewlett-Packard Development Co., L.P., Houston Location device of a data network device
US6777828B1 (en) * 2002-01-25 2004-08-17 Ronald J. Rothstein Management apparatus
AU2002258353A1 (en) * 2002-03-04 2003-09-16 Arcelik A.S. Household appliance with communication unit for external control
US7098772B2 (en) * 2002-05-28 2006-08-29 Cohen Richard S Method and apparatus for remotely controlling a plurality of devices
AU2002950343A0 (en) * 2002-07-24 2002-09-12 Evatayhow Holdings Pty Ltd Theft deterrence security system
IL152824A (en) 2002-11-13 2012-05-31 Mosaid Technologies Inc Addressable outlet and a network using same
JP4423258B2 (en) * 2003-07-07 2010-03-03 富士通株式会社 Control device
US7091853B2 (en) * 2003-12-11 2006-08-15 Lucent Technologies Inc. X10 communication of one or more messages between one or more mobile communication devices and one or more module components
IL160417A (en) 2004-02-16 2011-04-28 Mosaid Technologies Inc Outlet add-on module
US7873058B2 (en) 2004-11-08 2011-01-18 Mosaid Technologies Incorporated Outlet with analog signal adapter, a method for use thereof and a network using said outlet
US7333000B2 (en) * 2004-11-12 2008-02-19 Afco Systems Development, Inc. Tracking system and method for electrically powered equipment
US20070194945A1 (en) * 2004-12-07 2007-08-23 Paul Atkinson Mobile Device for Selectively Activating a Target and Method of Using Same
US9172275B2 (en) * 2005-07-11 2015-10-27 Minesh Bhakta Power monitoring and control system and method
US20070060151A1 (en) * 2005-09-09 2007-03-15 Huitai Development Corporation Power Line Communication System
US20080094186A1 (en) * 2006-10-04 2008-04-24 Viking Access Systems, Llc Apparatus and method for monitoring and controlling gate operators via power line communication
NL2000650C2 (en) * 2007-05-16 2008-11-18 Briljant Octrooi B V Theft protection system for application to a portable electrical installation.
US8108309B2 (en) * 2007-05-29 2012-01-31 Provalidate Protecting a manufactured item from counterfeiting
US20090037204A1 (en) * 2007-08-03 2009-02-05 Moxie Proxy Method for providing product safety to a manufactured item using a multiple use verification code
US8212377B2 (en) * 2008-02-05 2012-07-03 J. Baxter Brinkman International Corporation Smart control device
US20090195193A1 (en) * 2008-02-05 2009-08-06 Joseph Peter D Compact fluorescent light device
US8022821B2 (en) * 2008-02-05 2011-09-20 J. Baxter Brinkman International Corporation Smart power supply
US20090195192A1 (en) * 2008-02-05 2009-08-06 Joseph Peter D Smart light
US20090195179A1 (en) * 2008-02-05 2009-08-06 Joseph Peter D Power line communication
US20090195085A1 (en) * 2008-02-05 2009-08-06 Joseph Peter D Alternating current power source
US8450944B2 (en) * 2008-02-05 2013-05-28 J. Baxter Brinkman International Corporation Intelligent light for controlling lighting level
EP2255318A4 (en) * 2008-02-13 2011-06-15 Weng Wah Chng Theft-deterrent system and method
US20090212101A1 (en) * 2008-02-21 2009-08-27 Provalidate Method and system for providing product safety to a manufactured item with verification codes
US20100010643A1 (en) * 2008-07-13 2010-01-14 Afeka Academic Method and system for controlling a usage of an object
US20110125432A1 (en) * 2008-07-13 2011-05-26 Afeka Tel Aviv Academic College Of Engineering Remote monitoring of device operation by tracking its power consumption
US8566961B2 (en) * 2008-08-08 2013-10-22 Absolute Software Corporation Approaches for a location aware client
WO2010017517A1 (en) * 2008-08-08 2010-02-11 Phoenix Technologies Ltd. Secure computing environment using a client heartbeat to address theft and unauthorized access
US8556991B2 (en) * 2008-08-08 2013-10-15 Absolute Software Corporation Approaches for ensuring data security
EP2329582A1 (en) * 2008-08-25 2011-06-08 Cleanpoint Holdings Pty Ltd An electricity management device, an electrical appliance, a system for authorising electrical appliances to utilise electricity and a method of delivering renewable energy into a power grid
WO2011083967A2 (en) * 2010-01-05 2011-07-14 엘지전자 주식회사 Network system
DE102010001445A1 (en) * 2010-02-01 2011-08-04 Robert Bosch GmbH, 70469 Device and method for connecting an energy-converting terminal
US9337658B2 (en) 2010-02-17 2016-05-10 Lg Electronics Inc. Network system
US9207735B2 (en) * 2011-08-02 2015-12-08 Gram Power, Inc. Power management device and system
US20140219369A1 (en) * 2013-02-07 2014-08-07 Flextronics Ap, Llc Power line communications signal aggregation and switch
US20150052197A1 (en) * 2013-08-14 2015-02-19 General Electric Company Method and system for operating an appliance
US9647888B2 (en) 2014-05-30 2017-05-09 Belkin International Inc. Network addressable appliance interface device
US9813408B2 (en) * 2014-06-19 2017-11-07 Verizon Patent And Licensing Inc. Asset guardian
US9730040B2 (en) * 2014-08-04 2017-08-08 Carolyn W. Hafeman Communication apparatus, system and method
US9548594B1 (en) * 2015-07-24 2017-01-17 Eaton Corporation Electronic device and load center including the same

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4567557A (en) 1983-02-23 1986-01-28 Burns Martin J Building intelligence system
EP0369382A2 (en) 1988-11-14 1990-05-23 Sony Corporation Home-bus-information system
US5021779A (en) 1985-08-14 1991-06-04 Michael Bisak Security device
US5051720A (en) 1989-11-13 1991-09-24 Secure Telecom, Inc. Remote control system using power line of remote site
US5334975A (en) 1991-07-16 1994-08-02 Wachob David E Residential time reference system
US5340968A (en) * 1991-05-07 1994-08-23 Nippondenso Company, Ltd. Information storage medium with electronic and visual areas
US5400246A (en) 1989-05-09 1995-03-21 Ansan Industries, Ltd. Peripheral data acquisition, monitor, and adaptive control system via personal computer
US5406261A (en) * 1993-01-11 1995-04-11 Glenn; James T. Computer security apparatus and method
US5428342A (en) 1991-04-25 1995-06-27 Hitachi, Ltd. Analyzing system for operating condition of electrical apparatus
US5471190A (en) 1989-07-20 1995-11-28 Timothy D. Schoechle Method and apparatus for resource allocation in a communication network system
US5479157A (en) * 1990-01-19 1995-12-26 Prince Corporation Remote vehicle programming system
US5491463A (en) 1993-06-28 1996-02-13 Advanced Control Technologies, Inc. Power line communication system
US5554968A (en) 1994-08-22 1996-09-10 Lee; Raymond Data communication using power lines
US5570085A (en) 1989-06-02 1996-10-29 Ludo A. Bertsch Programmable distributed appliance control system
US5621662A (en) 1994-02-15 1997-04-15 Intellinet, Inc. Home automation system
US5748084A (en) * 1996-11-18 1998-05-05 Isikoff; Jeremy M. Device security system
US5764892A (en) * 1994-11-15 1998-06-09 Absolute Software Security apparatus and method
US5936526A (en) * 1998-01-13 1999-08-10 Micron Electronics, Inc. Apparatus for generating an alarm in a portable computer system
US5966081A (en) * 1997-09-24 1999-10-12 Chesnutt; R. Van Paging activated electronic security system
US6011473A (en) * 1998-01-13 2000-01-04 Micron Electronics, Inc. Method for generating an alarm in a portable computer system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4429299A (en) * 1979-01-05 1984-01-31 Robertshaw Controls Company Two-way AC power line communications system
US4418333A (en) * 1981-06-08 1983-11-29 Pittway Corporation Appliance control system
US4703306A (en) * 1986-09-26 1987-10-27 The Maytag Company Appliance system

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4567557A (en) 1983-02-23 1986-01-28 Burns Martin J Building intelligence system
US5021779A (en) 1985-08-14 1991-06-04 Michael Bisak Security device
EP0369382A2 (en) 1988-11-14 1990-05-23 Sony Corporation Home-bus-information system
US5400246A (en) 1989-05-09 1995-03-21 Ansan Industries, Ltd. Peripheral data acquisition, monitor, and adaptive control system via personal computer
US5570085A (en) 1989-06-02 1996-10-29 Ludo A. Bertsch Programmable distributed appliance control system
US5471190A (en) 1989-07-20 1995-11-28 Timothy D. Schoechle Method and apparatus for resource allocation in a communication network system
US5051720A (en) 1989-11-13 1991-09-24 Secure Telecom, Inc. Remote control system using power line of remote site
US5479157A (en) * 1990-01-19 1995-12-26 Prince Corporation Remote vehicle programming system
US5428342A (en) 1991-04-25 1995-06-27 Hitachi, Ltd. Analyzing system for operating condition of electrical apparatus
US5340968A (en) * 1991-05-07 1994-08-23 Nippondenso Company, Ltd. Information storage medium with electronic and visual areas
US5334975A (en) 1991-07-16 1994-08-02 Wachob David E Residential time reference system
US5406261A (en) * 1993-01-11 1995-04-11 Glenn; James T. Computer security apparatus and method
US5491463A (en) 1993-06-28 1996-02-13 Advanced Control Technologies, Inc. Power line communication system
US5621662A (en) 1994-02-15 1997-04-15 Intellinet, Inc. Home automation system
US5554968A (en) 1994-08-22 1996-09-10 Lee; Raymond Data communication using power lines
US5764892A (en) * 1994-11-15 1998-06-09 Absolute Software Security apparatus and method
US5748084A (en) * 1996-11-18 1998-05-05 Isikoff; Jeremy M. Device security system
US5966081A (en) * 1997-09-24 1999-10-12 Chesnutt; R. Van Paging activated electronic security system
US5936526A (en) * 1998-01-13 1999-08-10 Micron Electronics, Inc. Apparatus for generating an alarm in a portable computer system
US6011473A (en) * 1998-01-13 2000-01-04 Micron Electronics, Inc. Method for generating an alarm in a portable computer system

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
*Article entitled"ID Tags Can Foil Shoplifters", Popular Mechanics, Jan. 1999 edition, p. 23.
Disposable RF Labels, by Kevin R. Sharp, ID Systems Oct. 1998 Product Spotlight located at http://www.idsystems.com/pos1098.htm.
microlID RFID Development Kit, by Kevin R. Sharp, Nov. 1998 (part one of two vol.), vol. 18-No. 11, pp. 48-49 of "ID Systems" magazine.
Passive RFID Basics, by Pete Sorrells of Microchip Technology Inc., copyright 1998.
RFID Frequency Considerations, ID Systems Nov. 1998 Show Coverage located at http://www.idsystems.com/st1198-sb1.htm.
Scan-Tech 1998, by Kevin R. Sharp, Nov. 1998 (part one of two vol.), vol. 18-No. 11, pp. 50, 52-53 of "ID Systems" magazine.
Tag-It Implementation, ID Systems Oct. 1998 Product Spotlight located at http://www.idsystems.com/ps1098_sb1.htm.
What's New in RFID?, by Paul Quinn, ID Systems Feb. 1998 Technology Update located at http://www.idsystems.com/rfid0298.htm.

Cited By (531)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020093426A1 (en) * 1995-10-11 2002-07-18 Jackson Miles R. Enabling/enhancing a feature of an electronic device using radio frequency identification technology
US7057492B2 (en) 1995-10-11 2006-06-06 Motorola, Inc. Enabling/enhancing a feature of an electronic device using radio frequency identification technology
US8204787B2 (en) 1996-10-02 2012-06-19 Nintendo Of America Inc. Electronic registration system for product transactions
US9292854B2 (en) 1996-10-02 2016-03-22 E2Interactive, Inc. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US8788432B2 (en) 1996-10-02 2014-07-22 Nintendo Of America Inc. Method and apparatus for efficient handling of product return transactions
US8104682B2 (en) 1996-10-02 2012-01-31 Nintendo Of America Inc. Method and apparatus for efficient handling of product return transactions
US8433614B2 (en) 1996-10-02 2013-04-30 Nintendo Of America, Inc. Electronic registration system for product transactions
US7580860B2 (en) 1996-10-02 2009-08-25 Nintendo Of America Inc. Method and apparatus for efficient handling of product return transactions
US7797164B2 (en) 1996-10-02 2010-09-14 Nintendo Of America, Inc. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US20040172260A1 (en) * 1996-10-02 2004-09-02 Junger Peter J. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US8635168B2 (en) 1996-10-02 2014-01-21 Nintendo Of America Inc. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US20070296552A1 (en) * 1998-07-23 2007-12-27 Universal Electronics Inc. System and method for setting up a universal remote control
US9412261B2 (en) * 1998-07-23 2016-08-09 Universal Electronics Inc. System and method for setting up a universal remote control
US8502673B2 (en) 1998-08-14 2013-08-06 3M Innovative Properties Company Applications for radio frequency identification systems
US8006902B2 (en) 1998-08-14 2011-08-30 3M Innovative Properties Company Radio frequency identification systems applications
US7123151B2 (en) * 1998-08-14 2006-10-17 3M Innovative Properties Company Applications for radio frequency identification systems
US7728732B2 (en) 1998-08-14 2010-06-01 3M Innovative Properties Company Applications for radio frequency identification systems
US20080071627A1 (en) * 1998-11-13 2008-03-20 Nintendo Of America Inc. Method and apparatus for verifying product sale transactions and processing product returns
US8548860B2 (en) 1998-11-13 2013-10-01 Nintendo Of America Inc. Method and apparatus for verifying product sale transactions and processing product returns
US7890373B2 (en) 1998-11-13 2011-02-15 Nintendo Of America Inc. Method and apparatus for verifying product sale transactions and processing product returns
US8538801B2 (en) 1999-02-19 2013-09-17 Exxonmobile Research & Engineering Company System and method for processing financial transactions
US6647497B1 (en) * 1999-03-31 2003-11-11 International Business Machines Corporation Method and system for secure computer system transfer
US20070296589A1 (en) * 1999-04-22 2007-12-27 Micron Technology, Inc. Anti-theft system and apparatus and method for selectively disabling/enabling electrical apparatus
US20070018843A1 (en) * 1999-04-22 2007-01-25 Cullum Devon D Anti-theft system and apparatus and method for selectively disabling/enabling electrical apparatus
US20110068924A1 (en) * 2000-01-24 2011-03-24 Nextreme, Llc Pallet with pallet RFID reader/writer for conducting on-demand pallet inventory
US20020078363A1 (en) * 2000-03-24 2002-06-20 Hill Richard A. Apparatus and method for gathering and utilizing data
US7117374B2 (en) * 2000-03-24 2006-10-03 Intermec Ip Corp Apparatus and method for gathering and utilizing data
US8156026B2 (en) 2000-05-12 2012-04-10 Nintendo of America Ltd. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US20020056745A1 (en) * 2000-06-20 2002-05-16 De La Fuente Claudio Oscar Electronic product identification system for automatic participation and interaction of users on the internet and other electronic or mechanical marketing, diffusion, advertising promotion and/or purchase incentive programs
US8510171B2 (en) 2000-07-25 2013-08-13 Nintendo Of America Inc. Electronic product registration system with customizable return/warranty programs
US8126724B2 (en) 2000-10-10 2012-02-28 Nintendo Of America Inc. Voice recognition method and apparatus using model number lookup
US7729923B2 (en) 2000-10-10 2010-06-01 Nintendo Of America, Inc. Voice recognition and apparatus using model number lookup
US7072722B1 (en) * 2000-11-21 2006-07-04 Abb T&D Technology Ltd Digital protection and control device and method thereof
US20020140571A1 (en) * 2001-01-29 2002-10-03 Hayes Patrick H. System and method for using a hand held device to display product information
US6995652B2 (en) * 2001-04-11 2006-02-07 Battelle Memorial Institute K1-53 System and method for controlling remote devices
US20020149468A1 (en) * 2001-04-11 2002-10-17 Carrender Curtis Lee System and method for controlling remote devices
US6774782B2 (en) * 2001-04-27 2004-08-10 Battelle Memorial Institute Radio frequency personnel alerting security system and method
US20020169914A1 (en) * 2001-05-09 2002-11-14 Shteyn Yevgeniy Eugene Device identification and control in network environment
US7069345B2 (en) * 2001-05-09 2006-06-27 Koninklijke Philips Electronics N.V. Device identification and control in network environment
US9406012B2 (en) 2001-05-31 2016-08-02 Ruizhang Technology Limited Company Integrated circuits with persistent data storage
US7737825B1 (en) * 2001-05-31 2010-06-15 Alien Technology Corporation Integrated circuits with persistent data storage
US7411503B2 (en) 2001-05-31 2008-08-12 Alien Technology System and method for disabling data on radio frequency identification tags
US8464957B2 (en) 2001-05-31 2013-06-18 Alien Technology Corporation Integrated circuits with persistent data storage
US20050242196A1 (en) * 2001-05-31 2005-11-03 Alien Technology Corp. Integrated circuits with persistent data storage
US8056818B2 (en) 2001-05-31 2011-11-15 Alien Technology Corporation Integrated circuits with persistent data storage
US8936201B2 (en) 2001-05-31 2015-01-20 Alien Technology, Llc Integrated circuits with persistent data storage
US7377445B1 (en) 2001-05-31 2008-05-27 Alien Technology Corporation Integrated circuits with persistent data storage
US6933848B1 (en) * 2001-05-31 2005-08-23 Alien Technology Corporation System and method for disabling data on radio frequency identification tags
US7173528B1 (en) 2001-05-31 2007-02-06 Alien Technology Corporation System and method for disabling data on radio frequency identification tags
US7364084B2 (en) 2001-05-31 2008-04-29 Alien Technology Corporation Integrated circuits with persistent data storage
US20020194500A1 (en) * 2001-06-19 2002-12-19 Bajikar Sundeep M. Bluetooth based security system
US7260835B2 (en) * 2001-06-19 2007-08-21 Intel Corporation Bluetooth™ based security system
US7231521B2 (en) 2001-07-05 2007-06-12 Lucent Technologies Inc. Scheme for authentication and dynamic key exchange
US20030014646A1 (en) * 2001-07-05 2003-01-16 Buddhikot Milind M. Scheme for authentication and dynamic key exchange
US9913007B2 (en) * 2001-08-02 2018-03-06 Sony Corporation Remote control system and remote control method, device for performing remote control operation and control method therefor, device operable by remote control operation and control method therefor, and storage medium
US20120214476A1 (en) * 2001-08-02 2012-08-23 Sony Corporation Remote control system and remote control method, device for performing remote control operation and control method therefor, device operable by remote control operation and control method therefor, and storage medium
US20050151623A1 (en) * 2001-08-10 2005-07-14 Von Hoffmann Gerard PDA security system
US20030030542A1 (en) * 2001-08-10 2003-02-13 Von Hoffmann Gerard PDA security system
US20100262379A1 (en) * 2001-08-24 2010-10-14 Applied Biosystems, Llc Sequencing System With Memory
US20080288178A1 (en) * 2001-08-24 2008-11-20 Applera Corporation Sequencing system with memory
US8697004B2 (en) 2001-08-24 2014-04-15 Applied Biosystems, Llc Sequencing system with memory
US8140845B2 (en) 2001-09-13 2012-03-20 Alcatel Lucent Scheme for authentication and dynamic key exchange
US20030051140A1 (en) * 2001-09-13 2003-03-13 Buddhikot Milind M. Scheme for authentication and dynamic key exchange
US6763996B2 (en) * 2001-09-18 2004-07-20 Motorola, Inc. Method of communication in a radio frequency identification system
US20030052161A1 (en) * 2001-09-18 2003-03-20 Rakers Patrick L. Method of communication in a radio frequency identification system
US20100307921A1 (en) * 2001-09-19 2010-12-09 Life Technologies Corporation Microdevice with integrated memory
US10728398B2 (en) 2001-09-24 2020-07-28 E2Interactive, Inc. Inserting value into customer account at point of sale using a customer account identifier
US8712869B2 (en) 2001-11-15 2014-04-29 Nintendo Of America Inc. Non-serialized electronic product registration system and method of operating same
US8209226B2 (en) 2001-11-15 2012-06-26 Nintendo Of America Inc. Non-serialized electronic product registration system and method of operating same
US10445743B2 (en) 2001-11-15 2019-10-15 E2Interactive, Inc. Non-serialized electronic product registration system and method of operating same
US7215976B2 (en) * 2001-11-30 2007-05-08 Symbol Technologies, Inc. RFID device, system and method of operation including a hybrid backscatter-based RFID tag protocol compatible with RFID, bluetooth and/or IEEE 802.11x infrastructure
US20030104848A1 (en) * 2001-11-30 2003-06-05 Raj Brideglall RFID device, system and method of operation including a hybrid backscatter-based RFID tag protocol compatible with RFID, bluetooth and/or IEEE 802.11x infrastructure
US6901304B2 (en) * 2002-01-11 2005-05-31 Sap Aktiengesellschaft Item tracking system architectures providing real-time visibility to supply chain
US20030132854A1 (en) * 2002-01-11 2003-07-17 Swan Richard J. Item tracking system architectures providing real-time visibility to supply chain
WO2003077454A3 (en) * 2002-03-06 2004-03-11 Motorola Inc Customization of promotional material through use of programmable radio frequency identification technology
US20030171984A1 (en) * 2002-03-06 2003-09-11 Wodka Joseph F. Customization of promotional material through use of programmable radio frequency identification technology
WO2003077454A2 (en) * 2002-03-06 2003-09-18 Motorola, Inc. Customization of promotional material through use of programmable radio frequency identification technology
WO2003094105A1 (en) * 2002-04-30 2003-11-13 Koninklijke Philips Electronics N.V. Method of securing a deactivation of a rfid transponder
WO2003094382A1 (en) * 2002-04-30 2003-11-13 Dunotech Plc Adapter for communicating over power line
US20050212662A1 (en) * 2002-04-30 2005-09-29 Koninklijke Philips Electronics N.V. Groenewoudseweg 1 Method of securing a deactivation of a rfid transponder
US20050231036A1 (en) * 2002-04-30 2005-10-20 Moon-Young No Adapter for communicating over power line
CN100458836C (en) * 2002-04-30 2009-02-04 Nxp股份有限公司 Method of securing a deactivation of a RFID transponder
US20030236872A1 (en) * 2002-05-09 2003-12-25 Kestrel Wireless. Inc. Method and system for enabling electronic transactions via a personal device
US20050256903A1 (en) * 2002-06-24 2005-11-17 Van De Sluis Bartel M Managing a home network
US8196064B2 (en) 2002-06-27 2012-06-05 Id8 Group R2 Studios, Inc. Method, system, and computer program product for managing controlled residential or non-residential environments
US7184848B2 (en) 2002-06-27 2007-02-27 Openpeak Inc. Method, system, and computer program product for managing controlled residential or non-residential environments
US7933945B2 (en) 2002-06-27 2011-04-26 Openpeak Inc. Method, system, and computer program product for managing controlled residential or non-residential environments
US7024256B2 (en) 2002-06-27 2006-04-04 Openpeak Inc. Method, system, and computer program product for automatically managing components within a controlled environment
US20040163073A1 (en) * 2002-06-27 2004-08-19 Openpeak Inc. Method, system, and computer program product for automatically managing components within a controlled environment
US6792323B2 (en) 2002-06-27 2004-09-14 Openpeak Inc. Method, system, and computer program product for managing controlled residential or non-residential environments
US8116889B2 (en) 2002-06-27 2012-02-14 Openpeak Inc. Method, system, and computer program product for managing controlled residential or non-residential environments
US20050055472A1 (en) * 2002-06-27 2005-03-10 Open Peak Inc., Method, system, and computer program product for managing controlled residential or non-residential environments
US6726099B2 (en) 2002-09-05 2004-04-27 Honeywell International Inc. RFID tag having multiple transceivers
US7239229B2 (en) 2002-09-05 2007-07-03 Honeywell International Inc. Efficient protocol for reading RFID tags
US20040048579A1 (en) * 2002-09-05 2004-03-11 Honeywell International Inc. RFID tag and communication protocol for long range tag communications and power efficiency
US20040046644A1 (en) * 2002-09-05 2004-03-11 Honeywell International Inc. Efficient protocol for reading RFID tags
US20040046643A1 (en) * 2002-09-05 2004-03-11 Honeywell International Inc. Method and device for storing and distributing information in an RFID tag
US20060175408A1 (en) * 2002-09-05 2006-08-10 Becker Robert C RFID tag and communication protocol for long range tag communications and power efficiency
US20040046642A1 (en) * 2002-09-05 2004-03-11 Honeywell International Inc. Protocol for addressing groups of RFID tags
US20040074976A1 (en) * 2002-09-05 2004-04-22 Becker Robert C. RFID tag having multiple transceivers
US7044387B2 (en) 2002-09-05 2006-05-16 Honeywell International Inc. RFID tag and communication protocol for long range tag communications and power efficiency
US7573370B2 (en) 2002-09-05 2009-08-11 Honeywell International Inc. Method and device for storing and distributing information in an RFID tag
US7401740B2 (en) 2002-09-05 2008-07-22 Honeywell International Inc. RFID tag and communication protocol for long range tag communications and power efficiency
US7156312B2 (en) 2002-09-05 2007-01-02 Honeywell International Inc. RFID tag having multiple transceivers
US20060175072A1 (en) * 2002-09-09 2006-08-10 Rose Frank P Universal junction box with mounting aperture
US20070102181A1 (en) * 2002-09-09 2007-05-10 Rose Frank P Universal Junction Box with Mounting Aperture
US20050217887A1 (en) * 2002-09-09 2005-10-06 Rose Frank P Universal junction box
US7179993B2 (en) 2002-09-09 2007-02-20 Rose Frank P Universal junction box with mounting aperture
US7019211B2 (en) 2002-09-09 2006-03-28 Rose Frank P Universal junction box
US6842106B2 (en) * 2002-10-04 2005-01-11 Battelle Memorial Institute Challenged-based tag authentication model
US20040066278A1 (en) * 2002-10-04 2004-04-08 Hughes Michael A. Challenged-based tag authentication medel
US20040066274A1 (en) * 2002-10-07 2004-04-08 Doug Bailey Tamper detection and secure power failure recovery circuit
US7205883B2 (en) 2002-10-07 2007-04-17 Safenet, Inc. Tamper detection and secure power failure recovery circuit
US20060149871A1 (en) * 2002-10-15 2006-07-06 Koninklijke Philips Electronics N.V. Wireless security beacon for consumer equipment
US8526409B2 (en) 2002-10-17 2013-09-03 Alcatel Lucent Multi-interface mobility client
US7599323B2 (en) 2002-10-17 2009-10-06 Alcatel-Lucent Usa Inc. Multi-interface mobility client
US20100023763A1 (en) * 2002-10-17 2010-01-28 Chandranmenon Girish P Multi-interface mobility client
US20040077341A1 (en) * 2002-10-17 2004-04-22 Chandranmenon Girish P. Multi-interface mobility client
US20050102529A1 (en) * 2002-10-21 2005-05-12 Buddhikot Milind M. Mobility access gateway
US20070208864A1 (en) * 2002-10-21 2007-09-06 Flynn Lori A Mobility access gateway
US8174982B2 (en) 2002-10-21 2012-05-08 Alcatel Lucent Integrated web cache
US8332914B2 (en) 2002-10-21 2012-12-11 Alcatel Lucent Mobility access gateway
US20040087304A1 (en) * 2002-10-21 2004-05-06 Buddhikot Milind M. Integrated web cache
US20110007705A1 (en) * 2002-10-21 2011-01-13 Buddhikot Milind M Mobility access gateway
US7562393B2 (en) 2002-10-21 2009-07-14 Alcatel-Lucent Usa Inc. Mobility access gateway
US20090129319A1 (en) * 2002-10-21 2009-05-21 Buddhikot Milind M Integrated web cache
US7499401B2 (en) 2002-10-21 2009-03-03 Alcatel-Lucent Usa Inc. Integrated web cache
US20040100903A1 (en) * 2002-11-25 2004-05-27 Seung-Jae Han Quality of service mechanisms for mobility access device
US20060123570A1 (en) * 2002-12-18 2006-06-15 Pace John W System for enabling limited time trial products
ES2220202A1 (en) * 2002-12-31 2004-12-01 Fernando Mendez Rebollo Burglar alarm system for apparatus connected to domestic mains, has subsystems installed in apparatus required to be protected, and slaves for sharing connection to domestic mains with apparatus
US20040133704A1 (en) * 2003-01-07 2004-07-08 Openpeak Inc. Legacy device bridge for residential or non-residential networks
US7987489B2 (en) 2003-01-07 2011-07-26 Openpeak Inc. Legacy device bridge for residential or non-residential networks
US10432756B2 (en) 2003-01-07 2019-10-01 Microsoft Technology Licensing, Llc Legacy device bridge for residential or non-residential networks
US9578140B2 (en) 2003-01-07 2017-02-21 Microsoft Technology Licensing, Llc Legacy device bridge for residential or non-residential networks
US8793746B2 (en) 2003-01-07 2014-07-29 Id8 Group R2 Studios, Inc. Legacy device bridge for residential or non-residential networks
US7053764B2 (en) 2003-02-03 2006-05-30 Ingrid, Inc. Controller for a security system
US20040150521A1 (en) * 2003-02-03 2004-08-05 Stilp Louis A. RFID based security system
US7023341B2 (en) 2003-02-03 2006-04-04 Ingrid, Inc. RFID reader for a security network
US20040160324A1 (en) * 2003-02-03 2004-08-19 Stilp Louis A. Controller for a security system
US7019639B2 (en) 2003-02-03 2006-03-28 Ingrid, Inc. RFID based security network
US20040212503A1 (en) * 2003-02-03 2004-10-28 Stilp Louis A. Communications architecture for a security network
US7057512B2 (en) * 2003-02-03 2006-06-06 Ingrid, Inc. RFID reader for a security system
US7668990B2 (en) 2003-03-14 2010-02-23 Openpeak Inc. Method of controlling a device to perform an activity-based or an experience-based operation
US20050128048A1 (en) * 2003-03-14 2005-06-16 Openpeak Inc. Method, system, and computer program product for setup of multi-device control
US20040215750A1 (en) * 2003-04-28 2004-10-28 Stilp Louis A. Configuration program for a security system
US20040246097A1 (en) * 2003-06-05 2004-12-09 Queenan Joseph A. Secure electronic compartment identifier system
US9202323B2 (en) 2003-06-05 2015-12-01 Joseph A. Queenan Secure electronic compartment identifier system
US20090033498A1 (en) * 2003-06-30 2009-02-05 Heikki Huomo System and Method for Supporting Multiple Reader-Tag Configurations Using Multi-Mode Radio Frequency Tag
US7868737B2 (en) * 2003-06-30 2011-01-11 Nokia Corporation System and method for supporting multiple reader-tag configurations using multi-mode radio frequency tag
US8199016B2 (en) 2003-07-07 2012-06-12 Avery Dennison Corporation RFID device with changeable characteristics
US20070096915A1 (en) * 2003-07-07 2007-05-03 Forster Ian J RFID device with changeable characteristics
US20080211675A1 (en) * 2003-07-07 2008-09-04 Avery Dennison Corporation (Adc) Rfid device with changeable characteristics
US20080018477A1 (en) * 2003-07-07 2008-01-24 Avery Dennison Corporation RFID Device With Changeable Characteristics
US20100079287A1 (en) * 2003-07-07 2010-04-01 Forster Ian J Rfid device with changeable characteristics
US7629888B2 (en) 2003-07-07 2009-12-08 Avery Dennison Corporation RFID device with changeable characteristics
US7460015B2 (en) 2003-07-07 2008-12-02 Avery Dennison Corporation RFID device with changeable characteristics
US7477151B2 (en) 2003-07-07 2009-01-13 Avery Dennison Corporation RFID device with changeable characteristics
US9000924B2 (en) 2003-07-07 2015-04-07 Avery Dennison Corporation RFID device with changeable characteristics
US20050012616A1 (en) * 2003-07-07 2005-01-20 Forster Ian J. RFID device with changeable characteristics
US8451797B2 (en) 2003-07-14 2013-05-28 Alcaltel Lucent Method and system for mobility across heterogeneous address spaces
US20100061309A1 (en) * 2003-07-14 2010-03-11 Buddhikot Milind M Method and system for mobility across heterogeneous address spaces
US7453852B2 (en) 2003-07-14 2008-11-18 Lucent Technologies Inc. Method and system for mobility across heterogeneous address spaces
US20090040995A1 (en) * 2003-07-14 2009-02-12 Buddhikot Milind M Method and system for mobility across heterogeneous address spaces
US7630341B2 (en) 2003-07-14 2009-12-08 Alcatel-Lucent Usa Inc. Method and system for mobility across heterogeneous address spaces
US6967577B2 (en) 2003-08-11 2005-11-22 Accenture Global Services Gmbh Manufactured article recovery system
US20050061875A1 (en) * 2003-09-10 2005-03-24 Zai Li-Cheng Richard Method and apparatus for a secure RFID system
US20050097478A1 (en) * 2003-11-03 2005-05-05 Openpeak Inc. User interface for multi-device control
US10230538B2 (en) 2003-11-03 2019-03-12 Microsoft Technology Licensing, Llc User interface for multi-device control
US8042049B2 (en) 2003-11-03 2011-10-18 Openpeak Inc. User interface for multi-device control
US7840439B2 (en) 2003-11-10 2010-11-23 Nintendo Of America, Inc. RF-ID product tracking system with privacy enhancement
US8311892B2 (en) 2003-11-10 2012-11-13 Nintendo Of America Inc. RF-ID product tracking system with privacy enhancement
US10152614B2 (en) 2003-11-14 2018-12-11 E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US20060108421A1 (en) * 2003-12-03 2006-05-25 Becker Robert C RFID tag having multiple transceivers
US7952480B1 (en) 2004-01-20 2011-05-31 Technology, Patents & Licensing, Inc. RFID tag filtering and monitoring
US7420458B1 (en) 2004-01-20 2008-09-02 Charles A. Eldering Secondary card reader
US8072314B1 (en) 2004-01-20 2011-12-06 Mistal Software Limited Liability Company Secondary card reader
US8258956B1 (en) 2004-01-20 2012-09-04 Mistal Software Limited Liability Company RFID tag filtering and monitoring
US7298264B1 (en) 2004-01-20 2007-11-20 Charles A. Eldering RFID tag filtering and monitoring
US7167078B2 (en) 2004-02-19 2007-01-23 Pourchot Shawn C Electric, telephone or network access control system and method
US20050184856A1 (en) * 2004-02-19 2005-08-25 Pourchot Shawn C. Electric, telephone or network access control system and method
US9530035B2 (en) 2004-03-19 2016-12-27 Applied Biosystems, Llc Methods and systems for using RFID in biological field
US8049623B2 (en) 2004-03-19 2011-11-01 Applied Biosystems, Llc Methods and systems for using RFID in biological field
US8665071B2 (en) 2004-03-19 2014-03-04 Applied Biosystems, Llc Methods and systems for using RFID in biological field
US20050205673A1 (en) * 2004-03-19 2005-09-22 Applera Corporation Methods and systems for using RFID in biological field
US9019079B2 (en) 2004-03-19 2015-04-28 Applied Biosystems, Llc Methods and systems for using RFID in biological field
US8400304B2 (en) 2004-03-19 2013-03-19 Applied Biosystems, Llc Methods and systems for using RFID in biological field
US7880617B2 (en) 2004-03-19 2011-02-01 Applied Biosystems, Llc Methods and systems for using RFID in biological field
US7187286B2 (en) * 2004-03-19 2007-03-06 Applera Corporation Methods and systems for using RFID in biological field
US7382258B2 (en) 2004-03-19 2008-06-03 Applera Corporation Sample carrier device incorporating radio frequency identification, and method
US8669849B2 (en) 2004-03-19 2014-03-11 Applied Biosystems, Llc Methods and systems for using RFID in biological field
US8669848B2 (en) 2004-03-19 2014-03-11 Applied Biosystems, Llc Methods and systems for using RFID in biological field
US10369573B2 (en) 2004-03-19 2019-08-06 Applied Biosystems, Llc Methods and systems for using RFID in biological field
US20050235128A1 (en) * 2004-04-15 2005-10-20 Viresh Rustagi Automatic expansion of hard disk drive capacity in a storage device
US20050235283A1 (en) * 2004-04-15 2005-10-20 Wilson Christopher S Automatic setup of parameters in networked devices
US20050231849A1 (en) * 2004-04-15 2005-10-20 Viresh Rustagi Graphical user interface for hard disk drive management in a data storage system
US7681007B2 (en) 2004-04-15 2010-03-16 Broadcom Corporation Automatic expansion of hard disk drive capacity in a storage device
US20050235063A1 (en) * 2004-04-15 2005-10-20 Wilson Christopher S Automatic discovery of a networked device
US20050235336A1 (en) * 2004-04-15 2005-10-20 Kenneth Ma Data storage system and method that supports personal video recorder functionality
US8675240B2 (en) * 2004-04-20 2014-03-18 Avery Dennison Corporation Thermotransfer printer with single sheet intake means
US20070223014A1 (en) * 2004-04-20 2007-09-27 Johannes Lenkl Thermotransfer Printer With Single Sheet Intake Means
US20050257013A1 (en) * 2004-05-11 2005-11-17 Kenneth Ma Storage access prioritization using a data storage device
US7555613B2 (en) 2004-05-11 2009-06-30 Broadcom Corporation Storage access prioritization using a data storage device
US20050256983A1 (en) * 2004-05-12 2005-11-17 Kenneth Ma System and method to control access to data stored in a data storage device
US8543737B2 (en) * 2004-05-12 2013-09-24 Broadcom Corporation System and method to control access to data stored in a data storage device
US20050262322A1 (en) * 2004-05-21 2005-11-24 Kenneth Ma System and method of replacing a data storage drive
US7348887B1 (en) * 2004-06-15 2008-03-25 Eigent Technologies, Llc RFIDs embedded into semiconductors
US20060001544A1 (en) * 2004-06-30 2006-01-05 Wolfram Siefke Monitoring and alarm system
US7142119B2 (en) * 2004-06-30 2006-11-28 Sap Ag Monitoring and alarm system
US20060012489A1 (en) * 2004-07-07 2006-01-19 Hitachi, Ltd. Appliance control apparatus and electrical appliance
US20060011526A1 (en) * 2004-07-15 2006-01-19 Baarman David W Remotely controllable outlet for water treatment system
US7364651B2 (en) * 2004-07-15 2008-04-29 Access Business Group International, Llc Remotely controllable outlet for water treatment system
US20060017570A1 (en) * 2004-07-26 2006-01-26 Moskowitz Paul A Enabling and disabling a wireless RFID portable transponder
US7375631B2 (en) 2004-07-26 2008-05-20 Lenovo (Singapore) Pte. Ltd. Enabling and disabling a wireless RFID portable transponder
US20060044206A1 (en) * 2004-08-27 2006-03-02 Moskowitz Paul A Shielding wireless transponders
US20060054705A1 (en) * 2004-09-08 2006-03-16 Georgia-Pacific Corporation Package insert with integrated radio frequency transponder
US20070285250A1 (en) * 2004-09-22 2007-12-13 Moskowitz Paul A System and Method for Disabling RFID Tags
US7737853B2 (en) 2004-09-22 2010-06-15 International Business Machines Corporation System and method for disabling RFID tags
US20060061475A1 (en) * 2004-09-22 2006-03-23 International Business Machines Corporation System and method for disabling RFID tags
US7277016B2 (en) 2004-09-22 2007-10-02 International Business Machines Corporation System and method for disabling RFID tags
WO2006047582A3 (en) * 2004-10-26 2009-04-16 Kestrel Wireless Inc Method, system, and network for selectively controlling the utility a target
US20060095385A1 (en) * 2004-10-26 2006-05-04 Paul Atkinson Method and network for selectively controlling the utility a target
WO2006047582A2 (en) * 2004-10-26 2006-05-04 Kestrel Wireless Inc. Method, system, and network for selectively controlling the utility a target
US20060100983A1 (en) * 2004-10-26 2006-05-11 Paul Atkinson Method and system for selectively controlling the utility a target
US20080271161A1 (en) * 2004-11-23 2008-10-30 Koninklijke Philips Electronics N.V. Method and Apparatus for Transferring a Data Carrier of a First System to a Second System
WO2006056911A2 (en) 2004-11-23 2006-06-01 Koninklijke Philips Electronics N.V. Method and apparatus for transferring a data carrier of a first system to a second system
US20060119487A1 (en) * 2004-12-07 2006-06-08 Paul Atkinson Device and method for selectively activating a target
US20060131432A1 (en) * 2004-12-07 2006-06-22 Paul Atkinson Method and system for identifying a target
US20060123055A1 (en) * 2004-12-07 2006-06-08 Paul Atkinson Device and method for selectively controlling the utility of a target
US7316352B1 (en) 2004-12-23 2008-01-08 Storage Technology Corporation System and method for locked code on a radio frequency identification tag
US20060192653A1 (en) * 2005-02-18 2006-08-31 Paul Atkinson Device and method for selectively controlling the utility of an integrated circuit device
US20060190273A1 (en) * 2005-02-23 2006-08-24 International Business Machines Corporation Method, system, and storage medium for implementing transaction-based data exchange
US7734497B2 (en) 2005-02-23 2010-06-08 International Business Machines Corporation Method, system, and storage medium for implementing transaction-based data exchange
US20080238627A1 (en) * 2005-03-22 2008-10-02 Applera Corporation Sample carrier device incorporating radio frequency identification, and method
US20060230136A1 (en) * 2005-04-12 2006-10-12 Kenneth Ma Intelligent auto-archiving
US7455230B2 (en) 2005-04-22 2008-11-25 Nintendo Of America Inc. UPC, EAN and JAN validation system and method for loss prevention at point of sale/return
US20060254815A1 (en) * 2005-04-26 2006-11-16 Humphrey Thomas W Radiofrequency identification shielding
US20060265755A1 (en) * 2005-05-18 2006-11-23 Ta-Wei Liu Method And Related Apparatus For Enhancing Information Security Of A Computer System
US20070109129A1 (en) * 2005-05-24 2007-05-17 Sundstrom Kurt E Rfid reader systems detecting pilot tone
US8350665B1 (en) 2005-05-24 2013-01-08 Impinj, Inc. RFID reader systems detecting pilot tone
US20060273182A1 (en) * 2005-05-31 2006-12-07 Shusuke Iwata Semiconductor device
US7681801B2 (en) * 2005-05-31 2010-03-23 Semiconductor Energy Laboratory Co., Ltd RFID chip with write-once functionality for an operation-stop instruction
US20070011728A1 (en) * 2005-07-06 2007-01-11 White Charles A Method for Authenticating and Securing Transactions Using RF Communication
US20070007358A1 (en) * 2005-07-06 2007-01-11 White Charles A Device and System for Authenticating and Securing Transactions Using RF Communication
US20070228179A1 (en) * 2005-07-06 2007-10-04 Paul Atkinson System and Method for Loading an Embedded Device to Authenticate and Secure Transactions
US20070011729A1 (en) * 2005-07-06 2007-01-11 White Charles A Device and Method for Authenticating and Securing Transactions Using RF Communication
US7273181B2 (en) 2005-07-06 2007-09-25 Kestrel Wireless, Inc. Device and method for authenticating and securing transactions using RF communication
US20070008169A1 (en) * 2005-07-11 2007-01-11 Conero Ronald S A Radio Frequency Activated Integrated Circuit and Method of Disabling the Same
US20070021109A1 (en) * 2005-07-21 2007-01-25 Zellner Samuel N Remote disabling of an article of manufacture
US8374926B2 (en) * 2005-08-01 2013-02-12 Worthwhile Products Inventory control system
US20100187306A1 (en) * 2005-08-01 2010-07-29 Worthwhile Products Inventory control system
US20070043422A1 (en) * 2005-08-18 2007-02-22 Cappella, Inc. Delivery system and method of use for accurate positioning of a device in a bifurcation
US20100289627A1 (en) * 2005-08-19 2010-11-18 Adasa Inc. Fully Secure Item-Level Tagging
US8159349B2 (en) 2005-08-19 2012-04-17 Adasa Inc. Secure modular applicators to commission wireless sensors
US8917159B2 (en) 2005-08-19 2014-12-23 CLARKE William McALLISTER Fully secure item-level tagging
US20110018689A1 (en) * 2005-08-19 2011-01-27 Adasa Inc. Secure modular applicators to commision wireless sensors
US20070044095A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. RFID edge server with security plug-ins
US20070044094A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. JMX administration of RFID edge server
US20070044092A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. RFID edge server with socket multiplexing
US20070044089A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. Packaging of RFID software at edge server
US20070044093A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. Event boxcarring of RFID information sent from RFID edge server
US20070044090A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. Packaging of EPCIS software
US7394377B2 (en) 2005-08-22 2008-07-01 Bea Systems, Inc. RFID edge server with security plug-ins
US7495568B2 (en) * 2005-08-22 2009-02-24 Bea Systems, Inc. JMX administration of RFID edge server
US20070043827A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. RFID edge server with security WSRM
US7660890B2 (en) * 2005-08-22 2010-02-09 Bea Systems, Inc. RFID edge server with socket multiplexing
US7835954B2 (en) 2005-08-22 2010-11-16 Bea Systems, Inc. Event boxcarring of RFID information sent from RFID edge server
US20070043834A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. Store and forward messaging from RFID edge server
US20070044091A1 (en) * 2005-08-22 2007-02-22 Bea Systems, Inc. RFID edge server with in process JAVA connector to connect to legacy systems
US7805499B2 (en) 2005-08-22 2010-09-28 Bea Systems, Inc. RFID edge server with security WSRM
US20080233341A1 (en) * 2005-08-26 2008-09-25 Evonik Degussa Gmbh Special Aminoalkylsilane Compounds as Binders for Composite Materials
US20070223692A1 (en) * 2005-10-18 2007-09-27 Paul Atkinson Activation confirmation feedback circuits and methods
US8253567B2 (en) 2005-12-09 2012-08-28 Tego Inc. Multiple radio frequency network node RFID tag
US9405950B2 (en) 2005-12-09 2016-08-02 Tego, Inc. External access to memory on an RFID tag
US8269630B2 (en) 2005-12-09 2012-09-18 Tego Inc. Methods and systems of a multiple radio frequency network node RFID tag
US8279065B2 (en) 2005-12-09 2012-10-02 Tego Inc. Methods and systems of a multiple radio frequency network node RFID tag
US8284055B2 (en) 2005-12-09 2012-10-09 Tego Inc. Multiple radio frequency network node RFID tag
US8294579B2 (en) 2005-12-09 2012-10-23 Tego Inc. Multiple radio frequency network node RFID tag
US8248238B2 (en) 2005-12-09 2012-08-21 Tego Inc. Multiple radio frequency network node RFID tag
US9471821B2 (en) 2005-12-09 2016-10-18 Tego, Inc. External access to memory on an RFID tag
US8248239B2 (en) 2005-12-09 2012-08-21 Tego Inc. Multiple radio frequency network node RFID tag
US8325011B2 (en) 2005-12-09 2012-12-04 Tego Inc. Multiple radio frequency network node RFID tag
US9710682B2 (en) 2005-12-09 2017-07-18 Tego, Inc. Operating systems for an RFID tag
US20080186139A1 (en) * 2005-12-09 2008-08-07 Butler Timothy P Methods and systems of a multiple radio frequency network node rfid tag
US20080186137A1 (en) * 2005-12-09 2008-08-07 Butler Timothy P Methods and systems of a multiple radio frequency network node rfid tag
US9465559B2 (en) 2005-12-09 2016-10-11 Tego, Inc. System and method for emulating many time programmable memory
US9117128B2 (en) 2005-12-09 2015-08-25 Tego, Inc. External access to memory on an RFID tag
US20080211630A1 (en) * 2005-12-09 2008-09-04 Butler Timothy P Multiple radio frequency network node rfid tag
US9542577B2 (en) 2005-12-09 2017-01-10 Tego, Inc. Information RFID tagging facilities
US8242907B2 (en) * 2005-12-09 2012-08-14 Tego, Inc. Multiple radio frequency network node RFID tag
US10691992B2 (en) 2005-12-09 2020-06-23 Tego, Inc. RF tag with memory management
US9424447B2 (en) 2005-12-09 2016-08-23 Tego, Inc. RFID tag facility with access to a sensor
US8242908B2 (en) 2005-12-09 2012-08-14 Tego Inc. Methods and systems of a multiple radio frequency network node RFID tag
US8988223B2 (en) 2005-12-09 2015-03-24 Tego Inc. RFID drive management facility
US9361568B2 (en) 2005-12-09 2016-06-07 Tego, Inc. Radio frequency identification tag with hardened memory system
US8947233B2 (en) 2005-12-09 2015-02-03 Tego Inc. Methods and systems of a multiple radio frequency network node RFID tag
US8941470B2 (en) 2005-12-09 2015-01-27 Tego Inc. Methods and systems of a radio frequency network node RFID tag with hardened memory system
US9842290B2 (en) 2005-12-09 2017-12-12 Tego, Inc. Flight-cycle sensor monitoring of aviation component
US8558699B2 (en) 2005-12-09 2013-10-15 Tego Inc. Multiple radio frequency network node RFID tag
US9418263B2 (en) 2005-12-09 2016-08-16 Tego, Inc. Operating systems for an RFID tag
US9594998B2 (en) 2005-12-09 2017-03-14 Tego, Inc. Radio frequency identification tag with hardened memory system
US20080180249A1 (en) * 2005-12-09 2008-07-31 Butler Timothy P Multiple radio frequency network node rfid tag
US10430702B2 (en) 2005-12-09 2019-10-01 Tego, Inc. RF tag network connectivity through gateway facility
US9390362B2 (en) 2005-12-09 2016-07-12 Tego, Inc. Radio frequency identification tag with emulated multiple-time programmable memory
US20080252459A1 (en) * 2005-12-09 2008-10-16 Butler Timothy P Methods and systems of a multiple radio frequency network node rfid tag
US20080164975A1 (en) * 2005-12-09 2008-07-10 Butler Timothy P Multiple radio frequency network node rfid tag
US9858452B2 (en) 2005-12-09 2018-01-02 Tego, Inc. Information RFID tagging facilities
US20070136585A1 (en) * 2005-12-12 2007-06-14 Impinj, Inc. Determining authentication of RFID tags for indicating legitimacy of their associated items
US20070136584A1 (en) * 2005-12-12 2007-06-14 Impinj, Inc. Handling legitimate and unauthorized items in supply chain according to authentication of their RFID tags
US20080048833A1 (en) * 2006-01-12 2008-02-28 Oliver Ronald A Rfid reader system aided by rf power of measurement
US20080028420A1 (en) * 2006-01-20 2008-01-31 Paul Atkinson Optical Media with Reduced Areal-Sized Optical shutters
US20070185981A1 (en) * 2006-02-09 2007-08-09 Matsushita Electric Industrial Co., Ltd. Power line communication apparatus and power line communication system
US20090098829A1 (en) * 2006-04-26 2009-04-16 Power Secure Development Aps System for securing electrical apparatus
US7952466B2 (en) 2006-10-11 2011-05-31 International Business Machines Corporation Method and system for protecting RFID tags on purchased goods
US20080106385A1 (en) * 2006-10-11 2008-05-08 International Business Machines Corporation Method and system for protecting rfid tags on purchased goods
US7926727B2 (en) 2006-10-18 2011-04-19 Mstar Semiconductor, Inc. RFID tags, RFID electronic devices and related methods for anti-theft and data transmission purposes
US20080093463A1 (en) * 2006-10-18 2008-04-24 Wei Chang Rfid tags, rfid electronic devices and related methods for anti-theft and data transmission purposes
US20080129451A1 (en) * 2006-11-30 2008-06-05 Smires Daniel T Apparatus and method for automated inventory tracking and authentication
US8478648B2 (en) * 2006-11-30 2013-07-02 Vonage Network Llc Apparatus and method for automated inventory tracking and authentication
WO2008066668A3 (en) * 2006-11-30 2008-12-11 Vonage Network Inc Apparatus and method for automated inventory tracking and authentication
AU2007325944B2 (en) * 2006-11-30 2011-03-24 Vonage Network Llc Apparatus and method for automated inventory tracking and authentication
WO2008066668A2 (en) * 2006-11-30 2008-06-05 Vonage Network Inc. Apparatus and method for automated inventory tracking and authentication
US20080136603A1 (en) * 2006-12-08 2008-06-12 Electronics And Telecommunications Research Institute Low-powered rfid tag and method of expanding lifecycle of rfid tag
US8242911B2 (en) 2006-12-11 2012-08-14 Tego Inc. Composite multiple RFID tag facility
US20090289776A1 (en) * 2006-12-11 2009-11-26 Larry Moore Composite multiple rfid tag facility
US9335828B2 (en) 2007-01-29 2016-05-10 At&T Intellectual Property I, L.P. Gesture control
US9639169B2 (en) 2007-01-29 2017-05-02 At&T Intellectual Property I, L.P. Gesture control
US8736420B2 (en) * 2007-01-29 2014-05-27 At&T Intellectual Property I, L.P. Methods, systems, and products for controlling devices
US20080180301A1 (en) * 2007-01-29 2008-07-31 Aaron Jeffrey A Methods, systems, and products for controlling devices
US9898093B2 (en) 2007-01-29 2018-02-20 At&T Intellectual Property I, L.P. Gesture control
US20080218354A1 (en) * 2007-03-09 2008-09-11 Lorentz Robert D Non-networked rfid system
US10050441B2 (en) 2007-03-14 2018-08-14 Zonit Structured Solutions, Llc Premises power signal monitoring system
US11916377B2 (en) 2007-03-14 2024-02-27 Zonit Structured Solutions, Llc Premises power usage monitoring system
US10698469B2 (en) 2007-03-14 2020-06-30 Zonit Structured Solutions, Llc Premises power usage monitoring system
US20140025221A1 (en) * 2007-03-14 2014-01-23 Zonit Structured Solutions, Llc Smart electrical outlets and associated networks
US11316368B2 (en) 2007-03-14 2022-04-26 Zonit Structured Solutions, Llc Premises power usage monitoring system
US20080250510A1 (en) * 2007-04-05 2008-10-09 Jon Stevens Distribution channel loss protection for electronic devices
US8241369B2 (en) 2007-04-05 2012-08-14 Absolute Software Corporation Distribution channel loss protection for electronic devices
WO2008122130A1 (en) * 2007-04-05 2008-10-16 Absolute Software Corporation Distribution channel loss protection for electronic devices
US8062380B2 (en) 2007-04-05 2011-11-22 Absolute Software Corporation Distribution channel loss protection for electronic devices
US9971918B2 (en) 2007-05-04 2018-05-15 John D. Profanchik, Sr. Systems and methods for RFID-based access management of electronic devices
US9443361B2 (en) 2007-05-04 2016-09-13 John D. Profanchik Systems and methods for RFID-based access management of electronic devices
US20080273684A1 (en) * 2007-05-04 2008-11-06 3V Technologies Incorporated Systems and Methods for RFID-Based Access Management of Electronic Devices
US7953216B2 (en) 2007-05-04 2011-05-31 3V Technologies Incorporated Systems and methods for RFID-based access management of electronic devices
US10671821B2 (en) 2007-05-04 2020-06-02 John D. Profanchik, Sr. Systems and methods for RFID-based access management of electronic devices
US20080307474A1 (en) * 2007-06-07 2008-12-11 Broadcom Corporation Connectivity for consumer electronics products
US8108316B1 (en) * 2007-12-20 2012-01-31 Symantec Corporation Systems, apparatus, and methods for online purchasing
US20100118149A1 (en) * 2008-11-10 2010-05-13 Eduard Levin System and method for tracking and monitoring personnel and equipment
US8760520B2 (en) 2008-11-10 2014-06-24 Eduard Levin System and method for tracking and monitoring personnel and equipment
US8390456B2 (en) 2008-12-03 2013-03-05 Tego Inc. RFID tag facility with access to external devices
US8302024B2 (en) 2009-04-02 2012-10-30 Nintendo Of America Inc. Systems and/or methods for paging control including selective paging element display according to a binary subdivision and/or a serial progressive display approach
US9430135B2 (en) 2009-04-02 2016-08-30 E2Interactive, Inc. Systems and/or methods for paging control including selective paging element display according to a binary subdivision and/or a serial progressive display approach
US20100309878A1 (en) * 2009-06-08 2010-12-09 Aleksandr Stolyar Mobility access gateway
US8489461B2 (en) 2009-09-11 2013-07-16 Nintendo Of America Inc. System and/or method for handling returns involving products tied to post-paid subscriptions/services
US10296916B2 (en) 2009-09-11 2019-05-21 Maridee Joy Maraz System and/or method for handling recalled product purchases and/or return/warranty requests
US8239269B2 (en) 2009-09-11 2012-08-07 Nintendo Of America Inc. System and/or method for handling returns involving products tied to post-paid subscriptions/services
US10417641B2 (en) 2009-09-11 2019-09-17 E2Interactive, Inc. System and/or method for handling recalled product purchases and/or return/warranty requests
RU2517372C2 (en) * 2009-10-15 2014-05-27 ЗетТиИ Корпорейшн Multi-frequency label and method and system for dynamic adjustment of radiofrequency parameters of multi-frequency label
US11928696B2 (en) 2009-12-16 2024-03-12 E2Interactive, Inc. Systems and methods for generating a virtual value item for a promotional campaign
US20110153441A1 (en) * 2009-12-23 2011-06-23 Merrill Brooks Smith Systems and Methods for Authorizing Use of Validly Sold Merchandise
CN102770883A (en) * 2009-12-23 2012-11-07 e2因特莱科迪伏有限公司 Systems and methods for authorizing use of validly sold merchandise
US9846871B2 (en) 2010-04-12 2017-12-19 E2Interactive, Inc. Systems and/or methods for determining item serial number structure and intelligence
US10937076B2 (en) 2010-10-13 2021-03-02 E2Interactive, Inc. Online personalized gifting system
US11182836B2 (en) 2010-10-13 2021-11-23 E2Interactive, Inc. Gift card ordering system and method
US8595062B2 (en) 2010-11-15 2013-11-26 Nintendo Of America Inc. Systems and/or methods for fraud detection in award point programs
US9672711B2 (en) 2011-01-07 2017-06-06 Southern Imperial, Inc. System and method for integrated product protection
US9588534B2 (en) * 2011-05-16 2017-03-07 Zonit Structured Solutions, Llc Communications protocol for intelligent outlets
US20150066227A1 (en) * 2011-05-16 2015-03-05 Zonit Structured Solutions, Llc Communications protocol for intelligent outlets
US9197636B2 (en) 2011-07-12 2015-11-24 At&T Intellectual Property I, L.P. Devices, systems and methods for security using magnetic field based identification
US10523670B2 (en) 2011-07-12 2019-12-31 At&T Intellectual Property I, L.P. Devices, systems, and methods for security using magnetic field based identification
US9769165B2 (en) 2011-07-12 2017-09-19 At&T Intellectual Property I, L.P. Devices, systems and methods for security using magnetic field based identification
US11436651B2 (en) 2012-01-30 2022-09-06 E2Interactive, Inc. Group video generating system
US9633347B2 (en) 2012-05-04 2017-04-25 e2interactive. Inc Systems and/or methods for selling non-inventory items at point-of-sale (POS) locations
US11055686B2 (en) 2012-08-08 2021-07-06 E2Interactive, Inc. S/M for providing, reloading, and redeeming stored value cards used in transit applications
US10423867B2 (en) 2012-09-17 2019-09-24 E2Interactive, Inc. Composite activation indicia substrate
US11111065B2 (en) 2013-02-15 2021-09-07 E2Interactive, Inc. Gift card presentation devices
US11219288B2 (en) 2013-02-15 2022-01-11 E2Interactive, Inc. Gift card box with slanted tray and slit
US11120428B2 (en) 2013-05-02 2021-09-14 E2Interactive, Inc. Stored value card kiosk system and method
US10051630B2 (en) 2013-05-31 2018-08-14 At&T Intellectual Property I, L.P. Remote distributed antenna system
US9999038B2 (en) 2013-05-31 2018-06-12 At&T Intellectual Property I, L.P. Remote distributed antenna system
US11120462B2 (en) 2013-11-04 2021-09-14 E2Interactive, Inc. Systems and methods for using indicia of membership as a partial authorization in a transaction
US9674711B2 (en) 2013-11-06 2017-06-06 At&T Intellectual Property I, L.P. Surface-wave communications and methods thereof
US11017443B2 (en) 2014-04-30 2021-05-25 E2Interactive, Inc. System and method for a merchant onsite personalization gifting platform
US9430732B2 (en) 2014-05-08 2016-08-30 Tego, Inc. Three-dimension RFID tag with opening through structure
US9768833B2 (en) 2014-09-15 2017-09-19 At&T Intellectual Property I, L.P. Method and apparatus for sensing a condition in a transmission medium of electromagnetic waves
US9906269B2 (en) 2014-09-17 2018-02-27 At&T Intellectual Property I, L.P. Monitoring and mitigating conditions in a communication network
US10063280B2 (en) 2014-09-17 2018-08-28 At&T Intellectual Property I, L.P. Monitoring and mitigating conditions in a communication network
US10204244B2 (en) 2014-09-30 2019-02-12 Tego, Inc. Data aggregating radio frequency tag
US10891449B2 (en) 2014-09-30 2021-01-12 Tego, Inc. Self-monitoring wireless computing device
US9953193B2 (en) 2014-09-30 2018-04-24 Tego, Inc. Operating systems for an RFID tag
US10445536B2 (en) 2014-09-30 2019-10-15 Tego, Inc. Operating system for an RF tag
US9973416B2 (en) 2014-10-02 2018-05-15 At&T Intellectual Property I, L.P. Method and apparatus that provides fault tolerance in a communication network
US9685992B2 (en) 2014-10-03 2017-06-20 At&T Intellectual Property I, L.P. Circuit panel network and methods thereof
US9866276B2 (en) 2014-10-10 2018-01-09 At&T Intellectual Property I, L.P. Method and apparatus for arranging communication sessions in a communication system
US9847850B2 (en) 2014-10-14 2017-12-19 At&T Intellectual Property I, L.P. Method and apparatus for adjusting a mode of communication in a communication network
US9960808B2 (en) 2014-10-21 2018-05-01 At&T Intellectual Property I, L.P. Guided-wave transmission device and methods for use therewith
US9954286B2 (en) 2014-10-21 2018-04-24 At&T Intellectual Property I, L.P. Guided-wave transmission device with non-fundamental mode propagation and methods for use therewith
US9705610B2 (en) 2014-10-21 2017-07-11 At&T Intellectual Property I, L.P. Transmission device with impairment compensation and methods for use therewith
US9912033B2 (en) 2014-10-21 2018-03-06 At&T Intellectual Property I, Lp Guided wave coupler, coupling module and methods for use therewith
US9876587B2 (en) 2014-10-21 2018-01-23 At&T Intellectual Property I, L.P. Transmission device with impairment compensation and methods for use therewith
US9871558B2 (en) 2014-10-21 2018-01-16 At&T Intellectual Property I, L.P. Guided-wave transmission device and methods for use therewith
US9780834B2 (en) 2014-10-21 2017-10-03 At&T Intellectual Property I, L.P. Method and apparatus for transmitting electromagnetic waves
US9769020B2 (en) 2014-10-21 2017-09-19 At&T Intellectual Property I, L.P. Method and apparatus for responding to events affecting communications in a communication network
US9742521B2 (en) 2014-11-20 2017-08-22 At&T Intellectual Property I, L.P. Transmission device with mode division multiplexing and methods for use therewith
US9800327B2 (en) 2014-11-20 2017-10-24 At&T Intellectual Property I, L.P. Apparatus for controlling operations of a communication device and methods thereof
US9749083B2 (en) 2014-11-20 2017-08-29 At&T Intellectual Property I, L.P. Transmission device with mode division multiplexing and methods for use therewith
US10243784B2 (en) 2014-11-20 2019-03-26 At&T Intellectual Property I, L.P. System for generating topology information and methods thereof
US9954287B2 (en) 2014-11-20 2018-04-24 At&T Intellectual Property I, L.P. Apparatus for converting wireless signals and electromagnetic waves and methods thereof
US9742462B2 (en) 2014-12-04 2017-08-22 At&T Intellectual Property I, L.P. Transmission medium and communication interfaces and methods for use therewith
US10009067B2 (en) 2014-12-04 2018-06-26 At&T Intellectual Property I, L.P. Method and apparatus for configuring a communication interface
US9876571B2 (en) 2015-02-20 2018-01-23 At&T Intellectual Property I, Lp Guided-wave transmission device with non-fundamental mode propagation and methods for use therewith
US9876570B2 (en) 2015-02-20 2018-01-23 At&T Intellectual Property I, Lp Guided-wave transmission device with non-fundamental mode propagation and methods for use therewith
US9749013B2 (en) 2015-03-17 2017-08-29 At&T Intellectual Property I, L.P. Method and apparatus for reducing attenuation of electromagnetic waves guided by a transmission medium
US10224981B2 (en) 2015-04-24 2019-03-05 At&T Intellectual Property I, Lp Passive electrical coupling device and methods for use therewith
US9793955B2 (en) 2015-04-24 2017-10-17 At&T Intellectual Property I, Lp Passive electrical coupling device and methods for use therewith
US9831912B2 (en) 2015-04-24 2017-11-28 At&T Intellectual Property I, Lp Directional coupling device and methods for use therewith
US9705561B2 (en) 2015-04-24 2017-07-11 At&T Intellectual Property I, L.P. Directional coupling device and methods for use therewith
US9793954B2 (en) 2015-04-28 2017-10-17 At&T Intellectual Property I, L.P. Magnetic coupling device and methods for use therewith
US9871282B2 (en) 2015-05-14 2018-01-16 At&T Intellectual Property I, L.P. At least one transmission medium having a dielectric surface that is covered at least in part by a second dielectric
US9748626B2 (en) 2015-05-14 2017-08-29 At&T Intellectual Property I, L.P. Plurality of cables having different cross-sectional shapes which are bundled together to form a transmission medium
US9887447B2 (en) 2015-05-14 2018-02-06 At&T Intellectual Property I, L.P. Transmission medium having multiple cores and methods for use therewith
US10650940B2 (en) 2015-05-15 2020-05-12 At&T Intellectual Property I, L.P. Transmission medium having a conductive material and methods for use therewith
US9917341B2 (en) 2015-05-27 2018-03-13 At&T Intellectual Property I, L.P. Apparatus and method for launching electromagnetic waves and for modifying radial dimensions of the propagating electromagnetic waves
US10050697B2 (en) 2015-06-03 2018-08-14 At&T Intellectual Property I, L.P. Host node device and methods for use therewith
US9935703B2 (en) 2015-06-03 2018-04-03 At&T Intellectual Property I, L.P. Host node device and methods for use therewith
US9912382B2 (en) 2015-06-03 2018-03-06 At&T Intellectual Property I, Lp Network termination and methods for use therewith
US10812174B2 (en) 2015-06-03 2020-10-20 At&T Intellectual Property I, L.P. Client node device and methods for use therewith
US9866309B2 (en) 2015-06-03 2018-01-09 At&T Intellectual Property I, Lp Host node device and methods for use therewith
US10797781B2 (en) 2015-06-03 2020-10-06 At&T Intellectual Property I, L.P. Client node device and methods for use therewith
US9967002B2 (en) 2015-06-03 2018-05-08 At&T Intellectual I, Lp Network termination and methods for use therewith
US9912381B2 (en) 2015-06-03 2018-03-06 At&T Intellectual Property I, Lp Network termination and methods for use therewith
US9913139B2 (en) 2015-06-09 2018-03-06 At&T Intellectual Property I, L.P. Signal fingerprinting for authentication of communicating devices
US9997819B2 (en) 2015-06-09 2018-06-12 At&T Intellectual Property I, L.P. Transmission medium and method for facilitating propagation of electromagnetic waves via a core
US9820146B2 (en) 2015-06-12 2017-11-14 At&T Intellectual Property I, L.P. Method and apparatus for authentication and identity management of communicating devices
US10069185B2 (en) 2015-06-25 2018-09-04 At&T Intellectual Property I, L.P. Methods and apparatus for inducing a non-fundamental wave mode on a transmission medium
US9865911B2 (en) 2015-06-25 2018-01-09 At&T Intellectual Property I, L.P. Waveguide system for slot radiating first electromagnetic waves that are combined into a non-fundamental wave mode second electromagnetic wave on a transmission medium
US9787412B2 (en) 2015-06-25 2017-10-10 At&T Intellectual Property I, L.P. Methods and apparatus for inducing a fundamental wave mode on a transmission medium
US10148016B2 (en) 2015-07-14 2018-12-04 At&T Intellectual Property I, L.P. Apparatus and methods for communicating utilizing an antenna array
US10044409B2 (en) 2015-07-14 2018-08-07 At&T Intellectual Property I, L.P. Transmission medium and methods for use therewith
US9847566B2 (en) 2015-07-14 2017-12-19 At&T Intellectual Property I, L.P. Method and apparatus for adjusting a field of a signal to mitigate interference
US9929755B2 (en) 2015-07-14 2018-03-27 At&T Intellectual Property I, L.P. Method and apparatus for coupling an antenna to a device
US9853342B2 (en) 2015-07-14 2017-12-26 At&T Intellectual Property I, L.P. Dielectric transmission medium connector and methods for use therewith
US10205655B2 (en) 2015-07-14 2019-02-12 At&T Intellectual Property I, L.P. Apparatus and methods for communicating utilizing an antenna array and multiple communication paths
US9882257B2 (en) 2015-07-14 2018-01-30 At&T Intellectual Property I, L.P. Method and apparatus for launching a wave mode that mitigates interference
US10090606B2 (en) 2015-07-15 2018-10-02 At&T Intellectual Property I, L.P. Antenna system with dielectric array and methods for use therewith
US9912027B2 (en) 2015-07-23 2018-03-06 At&T Intellectual Property I, L.P. Method and apparatus for exchanging communication signals
US9948333B2 (en) 2015-07-23 2018-04-17 At&T Intellectual Property I, L.P. Method and apparatus for wireless communications to mitigate interference
US9749053B2 (en) 2015-07-23 2017-08-29 At&T Intellectual Property I, L.P. Node device, repeater and methods for use therewith
US9806818B2 (en) 2015-07-23 2017-10-31 At&T Intellectual Property I, Lp Node device, repeater and methods for use therewith
US9871283B2 (en) 2015-07-23 2018-01-16 At&T Intellectual Property I, Lp Transmission medium having a dielectric core comprised of plural members connected by a ball and socket configuration
US9838078B2 (en) 2015-07-31 2017-12-05 At&T Intellectual Property I, L.P. Method and apparatus for exchanging communication signals
US9967173B2 (en) 2015-07-31 2018-05-08 At&T Intellectual Property I, L.P. Method and apparatus for authentication and identity management of communicating devices
US9735833B2 (en) 2015-07-31 2017-08-15 At&T Intellectual Property I, L.P. Method and apparatus for communications management in a neighborhood network
US9904535B2 (en) 2015-09-14 2018-02-27 At&T Intellectual Property I, L.P. Method and apparatus for distributing software
US9769128B2 (en) 2015-09-28 2017-09-19 At&T Intellectual Property I, L.P. Method and apparatus for encryption of communications over a network
US9729197B2 (en) 2015-10-01 2017-08-08 At&T Intellectual Property I, L.P. Method and apparatus for communicating network management traffic over a network
US9876264B2 (en) 2015-10-02 2018-01-23 At&T Intellectual Property I, Lp Communication system, guided wave switch and methods for use therewith
US10355367B2 (en) 2015-10-16 2019-07-16 At&T Intellectual Property I, L.P. Antenna structure for exchanging wireless signals
US10592700B2 (en) * 2016-01-11 2020-03-17 The Adt Security Corporation Securing electronic property from unauthorized use
US20170200025A1 (en) * 2016-01-11 2017-07-13 Adt Us Holdings, Inc. Securing electronic property from unauthorized use
US9860075B1 (en) 2016-08-26 2018-01-02 At&T Intellectual Property I, L.P. Method and communication node for broadband distribution
US10811767B2 (en) 2016-10-21 2020-10-20 At&T Intellectual Property I, L.P. System and dielectric antenna with convex dielectric radome
US10374316B2 (en) 2016-10-21 2019-08-06 At&T Intellectual Property I, L.P. System and dielectric antenna with non-uniform dielectric
US10340573B2 (en) 2016-10-26 2019-07-02 At&T Intellectual Property I, L.P. Launcher with cylindrical coupling device and methods for use therewith
US10312567B2 (en) 2016-10-26 2019-06-04 At&T Intellectual Property I, L.P. Launcher with planar strip antenna and methods for use therewith
US10498044B2 (en) 2016-11-03 2019-12-03 At&T Intellectual Property I, L.P. Apparatus for configuring a surface of an antenna
US10225025B2 (en) 2016-11-03 2019-03-05 At&T Intellectual Property I, L.P. Method and apparatus for detecting a fault in a communication system
US10291334B2 (en) 2016-11-03 2019-05-14 At&T Intellectual Property I, L.P. System for detecting a fault in a communication system
US10224634B2 (en) 2016-11-03 2019-03-05 At&T Intellectual Property I, L.P. Methods and apparatus for adjusting an operational characteristic of an antenna
US10535928B2 (en) 2016-11-23 2020-01-14 At&T Intellectual Property I, L.P. Antenna system and methods for use therewith
US10340603B2 (en) 2016-11-23 2019-07-02 At&T Intellectual Property I, L.P. Antenna system having shielded structural configurations for assembly
US10178445B2 (en) 2016-11-23 2019-01-08 At&T Intellectual Property I, L.P. Methods, devices, and systems for load balancing between a plurality of waveguides
US10090594B2 (en) 2016-11-23 2018-10-02 At&T Intellectual Property I, L.P. Antenna system having structural configurations for assembly
US10340601B2 (en) 2016-11-23 2019-07-02 At&T Intellectual Property I, L.P. Multi-antenna system and methods for use therewith
US10361489B2 (en) 2016-12-01 2019-07-23 At&T Intellectual Property I, L.P. Dielectric dish antenna system and methods for use therewith
US10305190B2 (en) 2016-12-01 2019-05-28 At&T Intellectual Property I, L.P. Reflecting dielectric antenna system and methods for use therewith
US10819035B2 (en) 2016-12-06 2020-10-27 At&T Intellectual Property I, L.P. Launcher with helical antenna and methods for use therewith
US10637149B2 (en) 2016-12-06 2020-04-28 At&T Intellectual Property I, L.P. Injection molded dielectric antenna and methods for use therewith
US10755542B2 (en) 2016-12-06 2020-08-25 At&T Intellectual Property I, L.P. Method and apparatus for surveillance via guided wave communication
US10326494B2 (en) 2016-12-06 2019-06-18 At&T Intellectual Property I, L.P. Apparatus for measurement de-embedding and methods for use therewith
US10439675B2 (en) 2016-12-06 2019-10-08 At&T Intellectual Property I, L.P. Method and apparatus for repeating guided wave communication signals
US10020844B2 (en) 2016-12-06 2018-07-10 T&T Intellectual Property I, L.P. Method and apparatus for broadcast communication via guided waves
US9927517B1 (en) 2016-12-06 2018-03-27 At&T Intellectual Property I, L.P. Apparatus and methods for sensing rainfall
US10694379B2 (en) 2016-12-06 2020-06-23 At&T Intellectual Property I, L.P. Waveguide system with device-based authentication and methods for use therewith
US10382976B2 (en) 2016-12-06 2019-08-13 At&T Intellectual Property I, L.P. Method and apparatus for managing wireless communications based on communication paths and network device positions
US10727599B2 (en) 2016-12-06 2020-07-28 At&T Intellectual Property I, L.P. Launcher with slot antenna and methods for use therewith
US10135145B2 (en) 2016-12-06 2018-11-20 At&T Intellectual Property I, L.P. Apparatus and methods for generating an electromagnetic wave along a transmission medium
US10547348B2 (en) 2016-12-07 2020-01-28 At&T Intellectual Property I, L.P. Method and apparatus for switching transmission mediums in a communication system
US10446936B2 (en) 2016-12-07 2019-10-15 At&T Intellectual Property I, L.P. Multi-feed dielectric antenna system and methods for use therewith
US10389029B2 (en) 2016-12-07 2019-08-20 At&T Intellectual Property I, L.P. Multi-feed dielectric antenna system with core selection and methods for use therewith
US10139820B2 (en) 2016-12-07 2018-11-27 At&T Intellectual Property I, L.P. Method and apparatus for deploying equipment of a communication system
US10243270B2 (en) 2016-12-07 2019-03-26 At&T Intellectual Property I, L.P. Beam adaptive multi-feed dielectric antenna system and methods for use therewith
US9893795B1 (en) 2016-12-07 2018-02-13 At&T Intellectual Property I, Lp Method and repeater for broadband distribution
US10027397B2 (en) 2016-12-07 2018-07-17 At&T Intellectual Property I, L.P. Distributed antenna system and methods for use therewith
US10359749B2 (en) 2016-12-07 2019-07-23 At&T Intellectual Property I, L.P. Method and apparatus for utilities management via guided wave communication
US10168695B2 (en) 2016-12-07 2019-01-01 At&T Intellectual Property I, L.P. Method and apparatus for controlling an unmanned aircraft
US10389037B2 (en) 2016-12-08 2019-08-20 At&T Intellectual Property I, L.P. Apparatus and methods for selecting sections of an antenna array and use therewith
US10938108B2 (en) 2016-12-08 2021-03-02 At&T Intellectual Property I, L.P. Frequency selective multi-feed dielectric antenna system and methods for use therewith
US10069535B2 (en) 2016-12-08 2018-09-04 At&T Intellectual Property I, L.P. Apparatus and methods for launching electromagnetic waves having a certain electric field structure
US9911020B1 (en) 2016-12-08 2018-03-06 At&T Intellectual Property I, L.P. Method and apparatus for tracking via a radio frequency identification device
US10777873B2 (en) 2016-12-08 2020-09-15 At&T Intellectual Property I, L.P. Method and apparatus for mounting network devices
US10326689B2 (en) 2016-12-08 2019-06-18 At&T Intellectual Property I, L.P. Method and system for providing alternative communication paths
US10103422B2 (en) 2016-12-08 2018-10-16 At&T Intellectual Property I, L.P. Method and apparatus for mounting network devices
US9998870B1 (en) 2016-12-08 2018-06-12 At&T Intellectual Property I, L.P. Method and apparatus for proximity sensing
US10601494B2 (en) 2016-12-08 2020-03-24 At&T Intellectual Property I, L.P. Dual-band communication device and method for use therewith
US10530505B2 (en) 2016-12-08 2020-01-07 At&T Intellectual Property I, L.P. Apparatus and methods for launching electromagnetic waves along a transmission medium
US10411356B2 (en) 2016-12-08 2019-09-10 At&T Intellectual Property I, L.P. Apparatus and methods for selectively targeting communication devices with an antenna array
US10916969B2 (en) 2016-12-08 2021-02-09 At&T Intellectual Property I, L.P. Method and apparatus for providing power using an inductive coupling
US10264586B2 (en) 2016-12-09 2019-04-16 At&T Mobility Ii Llc Cloud-based packet controller and methods for use therewith
US10340983B2 (en) 2016-12-09 2019-07-02 At&T Intellectual Property I, L.P. Method and apparatus for surveying remote sites via guided wave communications
US9838896B1 (en) 2016-12-09 2017-12-05 At&T Intellectual Property I, L.P. Method and apparatus for assessing network coverage
US9973940B1 (en) 2017-02-27 2018-05-15 At&T Intellectual Property I, L.P. Apparatus and methods for dynamic impedance matching of a guided wave launcher
WO2018160910A1 (en) * 2017-03-02 2018-09-07 Walmart Apollo, Llc In-home product recall notification system and method
US10298293B2 (en) 2017-03-13 2019-05-21 At&T Intellectual Property I, L.P. Apparatus of communication utilizing wireless network devices
US11232340B1 (en) 2017-09-21 2022-01-25 Impinj, Inc. Digital identities for physical items
US11681889B1 (en) 2017-09-21 2023-06-20 Impinj, Inc. Digital identities for physical items
US10699178B1 (en) * 2017-09-21 2020-06-30 Impinj, Inc. Digital identities for physical items
US10496153B2 (en) * 2017-10-27 2019-12-03 EMC IP Holding Company LLC Method and system for binding chassis and components
US20190129497A1 (en) * 2017-10-27 2019-05-02 EMC IP Holding Company LLC Method and system for binding chassis and components
US10954049B2 (en) 2017-12-12 2021-03-23 E2Interactive, Inc. Viscous liquid vessel for gifting
US11112416B2 (en) 2018-01-30 2021-09-07 Life Technologies Corporation Instruments, devices and consumables for use in a workflow of a smart molecular analysis system
US11075925B2 (en) 2018-01-31 2021-07-27 EMC IP Holding Company LLC System and method to enable component inventory and compliance in the platform
US10693722B2 (en) 2018-03-28 2020-06-23 Dell Products L.P. Agentless method to bring solution and cluster awareness into infrastructure and support management portals
US10754708B2 (en) 2018-03-28 2020-08-25 EMC IP Holding Company LLC Orchestrator and console agnostic method to deploy infrastructure through self-describing deployment templates
US10514907B2 (en) 2018-03-28 2019-12-24 EMC IP Holding Company LLC System and method for out-of-the-box solution-level management via logical architecture awareness
US10795756B2 (en) 2018-04-24 2020-10-06 EMC IP Holding Company LLC System and method to predictively service and support the solution
US11086738B2 (en) 2018-04-24 2021-08-10 EMC IP Holding Company LLC System and method to automate solution level contextual support
US11599422B2 (en) 2018-10-16 2023-03-07 EMC IP Holding Company LLC System and method for device independent backup in distributed system
US10862761B2 (en) 2019-04-29 2020-12-08 EMC IP Holding Company LLC System and method for management of distributed systems
US11301557B2 (en) 2019-07-19 2022-04-12 Dell Products L.P. System and method for data processing device management
US11395142B2 (en) * 2020-01-31 2022-07-19 Lowe's Companies, Inc. System and techniques for secret key transfer in benefit denial system
US11831636B2 (en) 2020-01-31 2023-11-28 Lowe's Companies, Inc. Systems and techniques for trans-account device key transfer in benefit denial system

Also Published As

Publication number Publication date
WO2000005820A1 (en) 2000-02-03
US6005476A (en) 1999-12-21
WO2000005820A8 (en) 2000-06-02

Similar Documents

Publication Publication Date Title
US6317028B1 (en) Electronic identification, control, and security system and method for consumer electronics and the like
US20060095385A1 (en) Method and network for selectively controlling the utility a target
US5714933A (en) System for protection of goods against theft
US20060132285A1 (en) Device and method for selectively controlling a processing device
KR100264181B1 (en) Radio frequency indentification transponder with electronic circuit enabling/disabling capability
US7844505B1 (en) Automated real-time distributed tag reader network
US20070194945A1 (en) Mobile Device for Selectively Activating a Target and Method of Using Same
US7242290B2 (en) Testing methods for use with boxes
US20060192653A1 (en) Device and method for selectively controlling the utility of an integrated circuit device
MX2007015177A (en) Techniques for detecting rfid tags in electronic article surveillance systems using frequency mixing.
US7701335B2 (en) Theft deterrence security system
US20110196755A1 (en) System, method and software for house automation configuration at point of sale
JPH10512056A (en) Article information display system using electronic control tags
JP4343452B2 (en) Wireless tag
US7232069B1 (en) Methods and apparatus for disabling, enabling or setting the range of radio frequency identification devices
WO1998036391A1 (en) Security systems
US6639513B2 (en) Anti-pilferage system
GB2446178A (en) An electronic seal
KR100959779B1 (en) Intelligent home network system using I-Smart Key
GB2387744A (en) Transponder alarm system
CN109816883B (en) Electric appliance sharing method, device and system
WO2009058122A1 (en) An rfid system for providing data and power
WO2006089280A2 (en) Device and method for selectively controlling the utility of an integrated circuit device
CN101444034A (en) Device and method for selectively controlling the utility of a taget
EP4198856A1 (en) Lockable delivery box

Legal Events

Date Code Title Description
AS Assignment

Owner name: ELECTRONIC SECURITY AND IDENTIFICATION, LLC, ILLIN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VALIULIS, CARL;REEL/FRAME:011903/0825

Effective date: 20010607

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 4

SULP Surcharge for late payment
AS Assignment

Owner name: HINES & ASSOCIATES, INC., ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ELECTRONIC SECURITY & IDENTIFICATION, LLC;REEL/FRAME:017006/0412

Effective date: 20060112

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20091113